A tutorial on UAVs for wireless networks: Applications, challenges, and open problems

M Mozaffari, W Saad, M Bennis… - … surveys & tutorials, 2019 - ieeexplore.ieee.org
The use of flying platforms such as unmanned aerial vehicles (UAVs), popularly known as
drones, is rapidly growing. In particular, with their inherent attributes such as mobility …

A systems and control perspective of CPS security

SM Dibaji, M Pirani, DB Flamholz… - Annual reviews in …, 2019 - Elsevier
The comprehensive integration of instrumentation, communication, and control into physical
systems has led to the study of Cyber-Physical Systems (CPSs), a field that has recently …

Deep learning for signal authentication and security in massive internet-of-things systems

A Ferdowsi, W Saad - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Secure signal authentication is arguably one of the most challenging problems in the
Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to …

Robust deep reinforcement learning for security and safety in autonomous vehicle systems

A Ferdowsi, U Challita, W Saad… - 2018 21st International …, 2018 - ieeexplore.ieee.org
The dependence of autonomous vehicles (AVs) on sensors and communication links
exposes them to cyber-physical (CP) attacks by adversaries that seek to take control of the …

A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems

D Du, M Zhu, X Li, M Fei, S Bu, L Wu… - Journal of Modern …, 2022 - ieeexplore.ieee.org
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …

[HTML][HTML] Perspectives on harmful algal blooms (HABs) and the cyberbiosecurity of freshwater systems

DG Schmale III, AP Ault, W Saad, DT Scott… - … in Bioengineering and …, 2019 - frontiersin.org
Harmful Algal Blooms (HABs) have been observed in all 50 states in the US, ranging from
large freshwater lakes, such as the Great Lakes, to smaller inland lakes, rivers, and …

Deep learning-based dynamic watermarking for secure signal authentication in the Internet of Things

A Ferdowsi, W Saad - 2018 IEEE International Conference on …, 2018 - ieeexplore.ieee.org
Securing the Internet of Things (IoT) is a necessary milestone toward expediting the
deployment of its applications and services. In particular, the functionality of the IoT devices …

A dynamic game approach to strategic design of secure and resilient infrastructure network

J Chen, C Touati, Q Zhu - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Infrastructure networks are vulnerable to both cyber and physical attacks. Building a secure
and resilient networked system is essential for providing reliable and dependable services …

[PDF][PDF] Dynamic games for secure and resilient control system design

Y Huang, J Chen, L Huang, Q Zhu - National Science Review, 2020 - academic.oup.com
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …

Interdependence-aware game-theoretic framework for secure intelligent transportation systems

A Ferdowsi, A Eldosouky… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The operation of future intelligent transportation systems (ITSs), communications
infrastructure (CI), and power grids (PGs) will be highly interdependent. In particular …