Bibliographical review on cyber attacks from a control oriented perspective

HS Sánchez, D Rotondo, T Escobet, V Puig… - Annual Reviews in …, 2019 - Elsevier
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …

On the control of microgrids against cyber-attacks: A review of methods and applications

A Solat, GB Gharehpetian, MS Naderi… - Applied Energy, 2024 - Elsevier
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …

[HTML][HTML] Controller cyber-attack detection and isolation

A Sztyber-Betley, M Syfert, JM Kościelny, Z Górecka - Sensors, 2023 - mdpi.com
This article deals with the cyber security of industrial control systems. Methods for detecting
and isolating process faults and cyber-attacks, consisting of elementary actions named …

[PDF][PDF] Diagnosis approaches for detection and isolation of cyber attacks and faults on a two-tank system

E Chanthery, A Subias - … Workshop on Principles of Diagnosis DX' …, 2019 - laas.hal.science
Recently, a two-tank benchmark for detection and isolation of cyber-attacks has been
proposed to the diagnosis research community to test different diagnosis methods. In this …

A New Proposal for Detection and Location of Cyberattacks in Industrial Processes

A Rodríguez-Ramos, E Irigoyen… - … Workshop on Artificial …, 2023 - Springer
Abstract In the Industry 4.0 paradigm, the cybersecurity is a key aim to obtain high levels of
performance of the industries based on the use of the IoT technology and the Big Data …

Check for updates A Parallel Approach for Regular Search Algorithm

JA Lefebre-Lobaina… - Progress in Artificial …, 2023 - books.google.com
The process of finding minimal subsets of features that can differentiate objects belonging to
different classes, known as typical testors, is an exponential complexity problem. Several …

Time evolution pattern analysis for cyber attack detection in a two-tank benchmark

J Quevedo, HS Sánchez, D Rotondo… - … on Systems and …, 2019 - ieeexplore.ieee.org
This paper presents some results related to the detection and isolation of cyber attacks in a
recently proposed benchmark based on a two-tank system. The benchmark proposes some …

Diagnostics of Processes-Cloud Concept Study

JM Kościelny, M Bartyś, P Wnuk - … Control: Proceedings of KKA 2020—The …, 2020 - Springer
This paper is principally aimed at presenting and discussing the plausibility of
implementation of an idea of transferring diagnostics tasks to computational cloud. Particular …

[引用][C] Iniciar sesión