Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

A survey of the recent trends in deep learning based malware detection

UH Tayyab, FB Khan, MH Durad, A Khan… - Journal of Cybersecurity …, 2022 - mdpi.com
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying
malicious activity. Malicious activities potentially lead to a system breach or data …

[HTML][HTML] Industrial cyber-physical systems protection: A methodological review

R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …

Blockchain-based microgrid for safe and reliable power generation and distribution: a case study of Saudi Arabia

MM Khubrani, S Alam - Energies, 2023 - mdpi.com
Energy demand is increasing rapidly due to rapid growth and industrialization. It is
becoming more and more complex to manage generation and distribution due to the …

State estimation under joint false data injection attacks: Dealing with constraints and insecurity

W Xu, Z Wang, L Hu, J Kurths - IEEE Transactions on Automatic …, 2021 - ieeexplore.ieee.org
This article is concerned with the security issue in the state estimation problem for a
networked control system (NCS). A new model of joint false data injection (FDI) attack is …

Attack detection for cyber-physical systems: A zonotopic approach

J Li, Z Wang, Y Shen, L Xie - IEEE Transactions on Automatic …, 2023 - ieeexplore.ieee.org
This article studies the problem of sensor attack detection for a class of cyber-physical
systems with bounded perturbations. A novel attack detection method is proposed based on …

Recursive watermarking-based transient covert attack detection for the industrial cps

L Ma, Z Chu, C Yang, G Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The subject of attack detection for industrial cyber-physical systems (IPCSs) is covered in
this paper, which addresses threats from transient covert attacks (TCAs), also referred to as …

The vulnerability of distributed state estimator under stealthy attacks

T Sui, XM Sun - Automatica, 2021 - Elsevier
This paper focuses on a spatially large linear system with a distributed array of sensors,
each of which offers partial state measurements. Suppose that each sensor runs a …

Adversarial FDI Attack Monitoring: Toward Secure Defense of Industrial Electronics

R Ma, Z Hu, H Yang, Y Jiang, M Huo… - IEEE Industrial …, 2023 - ieeexplore.ieee.org
With the rapid developments in computational and communication resources, modern
industrial electronics systems can leverage networked structures to realize wireless remote …

Detection and identification of sparse sensor attacks in cyber-physical systems with side information

AY Lu, GH Yang - IEEE Transactions on Automatic Control, 2022 - ieeexplore.ieee.org
This article investigates the attack detection and identification problem for cyber-physical
systems under sparse sensor attacks. A novel candidate set construction algorithm, where …