Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem

I Aviv, U Ferri - International Journal of Critical Infrastructure Protection, 2023 - Elsevier
Abstract Since February 2022, the Russian-Ukrainian armed conflict significantly impacted
the digital landscape. This study examines the conflict's impacts on the local and global …

[HTML][HTML] 平行智能与CPSS: 三十年发展的回顾与展望

杨静, 王晓, 王雨桐, 刘忠民, 李小双… - 自动化 …, 2023 - slevr36v53.dating.isitadogday.com
社会物理信息系统(Cyber-physical-social systems, CPSS) 在传统物理信息系统(Cyber-
physical systems, CPS) 的基础上纳入对社会信号及社会关系的考虑, 利用网络世界近乎无限的 …

Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems

N Mtukushe, AK Onaolapo, A Aluko, DG Dorrell - Energies, 2023 - mdpi.com
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …

NUS: Noisy-sample-removed undersampling scheme for imbalanced classification and application to credit card fraud detection

H Zhu, MC Zhou, G Liu, Y Xie, S Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Since minority samples are substantially less common than majority samples, many
industrial applications, such as credit card fraud detection (CCFD) and defective part …

Distributed and time-delayed-winner-take-all network for competitive coordination of multiple robots

L Jin, S Liang, X Luo, MC Zhou - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this article, a distributed and time-delayed-winner-take-all (DT-WTA) network is
established and analyzed for competitively coordinated task assignment of a multirobot …

Discrete log anomaly detection: a novel time-aware graph-based link prediction approach

L Yan, C Luo, R Shao - Information Sciences, 2023 - Elsevier
With the implementation of online-service information systems, it is important to detect
system anomalies. Logs, serving as the system runtime information, are the key resources to …

A tutorial on internet of behaviors: Concept, architecture, technology, applications, and challenges

Q Zhao, G Li, J Cai, MC Zhou… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
In his blogs of 2012, Dr. Göte Nyman coined Internet of Behaviors (IoB). In his idea, people's
behaviors are very good predictors of their needs, and hence technology companies can …

Securing smart healthcare cyber-physical systems against blackhole and greyhole attacks using a blockchain-enabled gini index framework

M Javed, N Tariq, M Ashraf, FA Khan, M Asim, M Imran - Sensors, 2023 - mdpi.com
The increasing reliance on cyber-physical systems (CPSs) in critical domains such as
healthcare, smart grids, and intelligent transportation systems necessitates robust security …

Cyber-physical system security based on human activity recognition through IoT cloud computing

S Achar, N Faruqui, M Whaiduzzaman, A Awajan… - Electronics, 2023 - mdpi.com
Cyber-physical security is vital for protecting key computing infrastructure against cyber
attacks. Individuals, corporations, and society can all suffer considerable digital asset losses …