• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4591707)   Today's Articles (937)   Subscriber (49313)
Number Citation Analysis
1
Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. PeerJ Comput Sci 2024;10:e1793. [PMID: 38259893 PMCID: PMC10803060 DOI: 10.7717/peerj-cs.1793] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/20/2023] [Accepted: 12/13/2023] [Indexed: 01/24/2024]
2
Cyber hygiene concepts for nursing education. NURSE EDUCATION TODAY 2023;130:105940. [PMID: 37595324 DOI: 10.1016/j.nedt.2023.105940] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/21/2023] [Revised: 07/24/2023] [Accepted: 08/10/2023] [Indexed: 08/20/2023]
3
Data-driven load frequency cooperative control for multi-area power system integrated with VSCs and EV aggregators under cyber-attacks. ISA TRANSACTIONS 2023:S0019-0578(23)00423-8. [PMID: 37867022 DOI: 10.1016/j.isatra.2023.09.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/09/2023] [Revised: 07/28/2023] [Accepted: 09/15/2023] [Indexed: 10/24/2023]
4
Modelling cybersecurity regulations for automated vehicles. ACCIDENT; ANALYSIS AND PREVENTION 2023;186:107054. [PMID: 37023653 DOI: 10.1016/j.aap.2023.107054] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/12/2022] [Revised: 02/01/2023] [Accepted: 03/28/2023] [Indexed: 06/19/2023]
5
Event-based model predictive damping control for power systems with cyber-attacks. ISA TRANSACTIONS 2023;136:687-700. [PMID: 36543736 DOI: 10.1016/j.isatra.2022.11.028] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/15/2022] [Revised: 11/07/2022] [Accepted: 11/26/2022] [Indexed: 05/16/2023]
6
Dynamic event-based sliding mode security control for singular Semi-Markov jump LPV systems against deception attacks. ISA TRANSACTIONS 2023;133:116-133. [PMID: 35840412 DOI: 10.1016/j.isatra.2022.06.042] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/10/2021] [Revised: 05/25/2022] [Accepted: 06/28/2022] [Indexed: 06/15/2023]
7
Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels. ISA TRANSACTIONS 2022;128:294-308. [PMID: 34953583 DOI: 10.1016/j.isatra.2021.11.033] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/29/2021] [Revised: 11/28/2021] [Accepted: 11/28/2021] [Indexed: 06/14/2023]
8
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. CLUSTER COMPUTING 2021;25:561-578. [PMID: 34629940 PMCID: PMC8490144 DOI: 10.1007/s10586-021-03426-w] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/05/2021] [Revised: 09/09/2021] [Accepted: 09/17/2021] [Indexed: 06/13/2023]
9
A robust intelligent zero-day cyber-attack detection technique. COMPLEX INTELL SYST 2021;7:2211-2234. [PMID: 34777966 PMCID: PMC8160422 DOI: 10.1007/s40747-021-00396-9] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/21/2021] [Accepted: 05/10/2021] [Indexed: 11/28/2022]
10
Analysis of security and privacy challenges for DNA-genomics applications and databases. J Biomed Inform 2021;119:103815. [PMID: 34022422 DOI: 10.1016/j.jbi.2021.103815] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/28/2021] [Revised: 05/07/2021] [Accepted: 05/08/2021] [Indexed: 02/06/2023]
11
Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA TRANSACTIONS 2021;110:1-14. [PMID: 33039167 DOI: 10.1016/j.isatra.2020.10.002] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/30/2020] [Revised: 08/04/2020] [Accepted: 10/03/2020] [Indexed: 06/11/2023]
12
Event-triggered filter design for nonlinear cyber-physical systems subject to deception attacks. ISA TRANSACTIONS 2020;104:130-137. [PMID: 30902498 DOI: 10.1016/j.isatra.2019.02.036] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/28/2018] [Revised: 02/06/2019] [Accepted: 02/28/2019] [Indexed: 06/09/2023]
13
Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks. ISA TRANSACTIONS 2020;104:84-92. [PMID: 31097192 DOI: 10.1016/j.isatra.2019.04.017] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/30/2018] [Revised: 04/15/2019] [Accepted: 04/19/2019] [Indexed: 06/09/2023]
14
Distributed event-triggered H filtering over sensor networks with sensor saturations and cyber-attacks. ISA TRANSACTIONS 2018;81:63-75. [PMID: 30078519 DOI: 10.1016/j.isatra.2018.07.018] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/09/2018] [Revised: 05/25/2018] [Accepted: 07/16/2018] [Indexed: 06/08/2023]
15
Model-based approach for cyber-physical attack detection in water distribution systems. WATER RESEARCH 2018;139:132-143. [PMID: 29635150 DOI: 10.1016/j.watres.2018.03.039] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/16/2017] [Revised: 03/13/2018] [Accepted: 03/14/2018] [Indexed: 06/08/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA