Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges

CC Lin, CT Tsai, YL Liu, TT Chang… - Mobile Networks and …, 2023 - Springer
To implement various artificial intelligence and automation applications in smart factories,
edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so …

Sparse actuator attack detection and identification: A data-driven approach

Z Zhao, Y Xu, Y Li, Y Zhao, B Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article aims to investigate the data-driven attack detection and identification problem for
cyber–physical systems under sparse actuator attacks, by developing tools from subspace …

Road-map aided gaussian mixture labeled multi-bernoulli filter for ground multi-target tracking

C Yang, X Cao, Z Shi - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
Ground multi-target tracking (MTT) is one of the core tasks of airborne ground moving target
indicator (GMTI) radar and automotive radar. However, ground MTT still remains a …

Optimal energy constrained deception attacks in cyber–physical systems with multiple channels: A fusion attack approach

YG Li, GH Yang, X Wang - ISA transactions, 2023 - Elsevier
This paper studies the issue of developing the optimal deception attacks on the multiple
channels in cyber–physical systems, where the attackers are limited by energy constraints …

Trustworthiness analysis and evaluation for command and control cyber-physical systems using generalized stochastic Petri nets

X Sun, Z Yu, H Gao, X Li - Information Sciences, 2023 - Elsevier
Command and control systems are a typical kind of cyber-physical systems (CPSs), usually
called command and control CPSs (C 3 PSs). C 3 PSs are in general thought of as the most …

A labeled rfs-based framework for multiple integrity attackers detection and identification in cyber-physical systems

C Yang, L Mo, X Cao, H Zhang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The problem of multiple integrity attacks (attackers) detection and identification (MIADI) in
cyber–physical systems (CPSs) is still a challenging problem to date. The goal of this article …

Window-type detector for stealthy false data injection attack in cyber-physical systems

C Ning, Z Xi - International Journal of Systems Science, 2023 - Taylor & Francis
In recent years, the security issues of cyber-physical systems (CPSs) have attracted
extensive attention from researchers. In this paper, a novel window-type detector (WTD) is …

Fast Attack Detection for Cyber–Physical Systems Using Dynamic Data Encryption

T Li, B Chen, S Liu, Z Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
To defend the cyber–physical system (CPSs) from cyber-attacks, this work proposes an
unified intrusion detection mechanism which is capable to fast hunt various types of attacks …

Distributed Multiple Attacks Detection via Consensus AA-GMPHD Filter

C Yang, X Cao, L He, H Zhang - IEEE Transactions on Systems …, 2023 - ieeexplore.ieee.org
This article is concerned with the problem of multiple attacks detection (MAD) for distributed
sensor networks (SNs) under multiple malicious attacks. The goal of this article is to develop …