A survey on underwater wireless sensor networks: Requirements, taxonomy, recent advances, and open research challenges

S Fattah, A Gani, I Ahmedy, MYI Idris… - Sensors, 2020 - mdpi.com
The domain of underwater wireless sensor networks (UWSNs) had received a lot of attention
recently due to its significant advanced capabilities in the ocean surveillance, marine …

Sok: A minimalist approach to formalizing analog sensor security

C Yan, H Shin, C Bolton, W Xu… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Over the last six years, several papers demonstrated how intentional analog interference
based on acoustics, RF, lasers, and other physical modalities could induce faults, influence …

Cyber-attacks on the Oil & Gas sector: A survey on incident assessment and attack patterns

G Stergiopoulos, DA Gritzalis, E Limnaios - Ieee Access, 2020 - ieeexplore.ieee.org
During the past two decades, oil and gas operational and information technology systems
have experienced constant digital growth, closely followed by an increasing number of cyber …

Event-triggered distributed state estimation for cyber-physical systems under DoS attacks

Y Liu, GH Yang - IEEE transactions on cybernetics, 2020 - ieeexplore.ieee.org
This article investigates the event-triggered distributed state estimation problem for a class of
cyber-physical systems (CPSs) with multiple transmission channels under denial-of-service …

Multi-source, multi-object and multi-domain (M-SOD) electromagnetic interference system optimised by intelligent optimisation approaches

Y Hu, M Li, X Liu, Y Tan - Natural computing, 2020 - Springer
With the wide use of electromagnetic information equipment, a large number of wireless
radiation systems coexisting in the same region produce intentional or unintentional …

混合攻击下时变信息物理系统的有限时域H∞ 控制.

刘珊, 黎善斌, 胥布工 - Control Theory & Applications …, 2020 - search.ebscohost.com
本文讨论了一类线性时变信息物理系统(CPS) 在有限时域内受到混合攻击的H∞ 控制问题.
上述提到的混合攻击, 包括对传感器和控制器之间通信通道发起的拒绝服务(DoS) …

An Encryption System for Securing Physical Signals

Y Mirsky, B Fedidat, Y Haddad - … 2020, Washington, DC, USA, October 21 …, 2020 - Springer
Secure communication is a necessity. However, encryption is commonly only applied to the
upper layers of the protocol stack. This exposes network information to eavesdroppers …

[PDF][PDF] Authorization to Submit Thesis

T Bartholomaus - 2020 - objects.lib.uidaho.edu
The retreat and advance of marine-terminating outlet glaciers in Greenland plays a critical
role in modulating ice sheet mass balance. However, the frontal ablation processes that …

A REVIEW ON VARIOUS SECURITY THREATS ON MOBILE ADHOC NETWORK.

A Tomar, A Sariya - International Journal of Research Science and …, 2020 - ijrsm.com
The open network of the wireless intermediate leaves it open to on purpose interference
attacks, typically referred to as jamming. This intentional attacks interference with wireless …

Finite horizon H∞ control for time-varying cyber-physical system under hybrid attacks.

LIU Shan, LI Shan-bin - Control Theory & Applications …, 2020 - search.ebscohost.com
English In this paper, the H∞ control problem for a class of linear time-varying cyber-
physical system (CPS) under hybrid attacks in a finite horizon is considered. The hybrid …