Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach

S Gao, H Zhang, Z Wang, C Huang - Security and Safety, 2022 - sands.edpsciences.org
This paper investigates the system security problem of cyber-physical systems (CPSs),
which is not only more practical but also more significant to deal with than the detecting …

一种基于多层次识别的免疫算法及其改进

张峰, 朱艳琴 - 信息安全与通信保密, 2007 - cqvip.com
具有自适应功能的算法是实现智能化信息安全系统的关键. 免疫算法是模拟生物免疫系统功能的
一种智能学习算法. 论文介绍了一种全新的免疫学习算法. 该算法特有的多层识别机制可以更加 …

Machine learning based network intrusion detection

CH Lee, YY Su, YC Lin, SJ Lee - 2017 2nd IEEE International …, 2017 - ieeexplore.ieee.org
Network security has become a very important issue and attracted a lot of study and practice.
To detect or prevent network attacks, a network intrusion detection (NID) system may be …

[引用][C] 神经网络在入侵检测系统中的研究

廖年冬 - 2006 - 贵州: 贵州

Optimal stealthy attack with historical data on cyber–physical systems

XX Ren, GH Yang, XG Zhang - Automatica, 2023 - Elsevier
This paper investigates the strictly stealthy attack on cyber–physical systems (CPSs), where
the attacker aims to degrade the remote estimation performance maximally while bypassing …

Improving extreme learning machine accuracy utilizing genetic algorithm for intrusion detection purposes

AJ Obaid, KA Alghurabi, SAK Albermany… - Research in Intelligent …, 2021 - Springer
Intrusion detection system (IDS) is a kind of software protection which is developed in order
to automatically provide alarms to the supervisor when someone or something tries …

[引用][C] 虚假数据注入攻击下信息物理系统的弹性控制

王萃清 - 2018 - 兰州: 兰州理工大学

A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization

A Alzaqebah, I Aljarah, O Al-Kadi - Computers & Security, 2023 - Elsevier
The surge in cyber-attacks has driven demand for robust Intrusion detection systems (IDSs)
to protect underlying data and sustain availability of network services. Detecting and …

[引用][C] 针对PMU 测量的虚假数据注入攻击检测方法

周婧怡, 李红娇 - 信息网络安全, 2022

A secure robot learning framework for cyber attack scheduling and countermeasure

C Wu, W Yao, W Luo, W Pan, G Sun… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The problem of learning-based control for robots has been extensively studied, whereas the
security issue under malicious adversaries has not been paid much attention to. Malicious …