Filters








426 Hits in 7.0 sec

Secure Particle Filtering for Cyber-Physical Systems With Binary Sensors Under Multiple Attacks

Weihao Song, Zidong Wang, Jianan Wang, Fuad E. Alsaadi, Jiayuan Shan
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hgg5pl76svbjtlbsafmrhnm24i" style="color: black;">IEEE Systems Journal</a> </i> &nbsp;
Index Terms-Secure particle filtering, cyber-physical systems, binary sensors, randomly occurring attacks, target tracking. © 2021 IEEE. Personal use of this material is permitted.  ...  This paper is concerned with the secure particle filtering problem for a class of discrete-time nonlinear cyberphysical systems with binary sensors in the presence of non-Gaussian noises and multiple malicious  ...  The purpose of this paper is to design a secure particle filtering algorithm for a class of nonlinear/non-Gaussian CPSs with binary sensors under multiple attacks such that the MMSE estimate of the state  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsyst.2021.3064920">doi:10.1109/jsyst.2021.3064920</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i4zruoh4xvcdfez6sfxbvz3w7a">fatcat:i4zruoh4xvcdfez6sfxbvz3w7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210716060609/https://bura.brunel.ac.uk/bitstream/2438/22682/3/FullText.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/62/1762a0724634b3aa972a16ea55c094e9d45a5b00.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsyst.2021.3064920"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Privacy-Preserving Data Access Control in the Smart Grid [chapter]

<span title="2016-03-23">2016</span> <i title="CRC Press"> Cyber Security for Industrial Control Systems </i> &nbsp;
SECURE STATE We consider security issues in remote state estimation of cyber-physical systems in this chapter. We first investigate the single-sensor case.  ...  Introduction Cyber-physical systems (CPS) are systems that integrate sensing, control, communication, computation, and physical process.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/b19629-16">doi:10.1201/b19629-16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vgv3w7wp4ves5d33es4ztfspom">fatcat:vgv3w7wp4ves5d33es4ztfspom</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201231232026/https://s3-euw1-ap-pe-ws4-capi2-distribution-p.s3-eu-west-1.amazonaws.com/books/9780429091810/HUBPMP/9780429091810_googleScholarPDF.pdf?response-content-disposition=attachment%3B%20filename%3D%229780429091810_googlepreview.pdf%22&amp;response-content-type=application%2Fpdf&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEN%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMSJHMEUCICVkPSBAk5Cm3%2FrZ7cdp2ciuWdVcqCJrtMkzZS%2Bpn2SXAiEAtSrydDW0IZ6U8N%2F9afOZDkUhVOSMVzYvubBW4tLnrSUqvQMImP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARACGgwwMTIxNzcyNjQ1MTEiDC31R8wETXvZdBCi7yqRA4p3EELYz56AhtGyJSVjnNDRGABnVq0Qgiqi2pe81BYQxrynfCjYqQczstO7zBYeb44RxJw4UU7g6dJbaqitUq%2FaWK%2BP6tEmSoZR08FeX6BHfvalRATRGzYNqR%2BXDCcs%2FivJFpTUWw9lLAcvOR1B%2FxxfSgN6ccUm8jipvCNfwPeG3Sfi4Oq%2F97SBgwzEpmWedZxUZxd7dXYIoLlsIPE6YpqkJPwouQcL74YbzvB1GxtWQL6KPrnpmsyx54RoxP9ZJ%2FIJpT2lo42CJr848Gf820vU%2BNTzMjO3sL%2FubNOsxDPFiaJKLFXPKB8Id0L73Ko1OU37VBgJ8cbMD9ow%2BQVPZCVl7oukPJzPR%2F%2FUKw5sDWtpJvUyJgDPEKfbWFGUITL27fVLzPfTIzTTzeW1G%2Fi70LU7z03PZsZfITSTk5keCVVt3C1z4lAWD7jx85DtfgFDTTt8BpjbMRWkrnhqS5LslP8ZkoWecP9MSW1h4koezQAAftN%2BfamC8bgu7QKrFxkmxl162e5UpL%2FHW3HP2P9yw3kiMKmvuf8FOusBso%2Bp4JfG33MASW%2Bw2iBOStcKK0IHnHe82sd55GgyQFZcPpy3Nmqn%2BoaDhahZvfrDVvkQiN8G%2BZKNGXEffj1wtSItRSzmSGmLhaJ4l6KrqBYfjG%2B6rdlcykYgkU56ijp2VsmFOR4VJJCbZcmva2q7DVAuUFTaPDAwR5uJV%2FYQv8s%2FwYdxCJDwRRZcRZcg%2B2s90LyaCr7Txi%2BA0OPS9%2FYq7eWHHLIlBS3r2KPrAseRqE1EGjVldEVi01e0GTbKs0iZJRqxrg5Iz4hXGtgCjxj7QicCRLjjBSzrklHZiUPuRRM%2FYtjqoqbgNu%2B3Mg%3D%3D&amp;AWSAccessKeyId=ASIAQFVOSJ57XKNFG5G4&amp;Expires=1610061625&amp;Signature=SLqaEcVl4yItuqWh%2FRCENsHnWHM%3D" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/56/ba56a3c2058037072d36c3fc278af9c7bf7f08b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1201/b19629-16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Robust Cyber–Physical Systems: Concept, models, and implementation

Fei Hu, Yu Lu, Athanasios V. Vasilakos, Qi Hao, Rui Ma, Yogendra Patil, Ting Zhang, Jiang Lu, Xin Li, Neal N. Xiong
<span title="">2016</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/idqeix2ukbd5fbgjjdkjmaj3ka" style="color: black;">Future generations computer systems</a> </i> &nbsp;
(sensing data) have noise or attacks; Security means that the system can overcome the cyber-physical interaction attacks; and Systematicness means that the system has a seamless integration of sensors  ...  We will use two detailed examples from our achieved projects to explain how to achieve a robust, systematic CPS design: Case study 1 is on the design of a rehabilitation system with cyber (sensors) and  ...  National Science Foundation (NSF) for their support of our CPS development under the grant No. DUE-1315328. Any ideas presented here do not necessarily represent NSF's opinions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.future.2015.06.006">doi:10.1016/j.future.2015.06.006</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uu4jvdxq3rbh7jstt4btdku5c4">fatcat:uu4jvdxq3rbh7jstt4btdku5c4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180723062309/https://manuscript.elsevier.com/S0167739X15002071/pdf/S0167739X15002071.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/0f/0e0f5619e6a0e92f0d0a98c7f022a27ecb655174.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.future.2015.06.006"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

A Model-Based, Decision-Theoretic Perspective on Automated Cyber Response [article]

Lashon B. Booker, Scott A. Musman
<span title="2020-02-20">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Cyber-attacks can occur at machine speeds that are far too fast for human-in-the-loop (or sometimes on-the-loop) decision making to be a viable option.  ...  We combine a simulation of the system to be defended with an anytime online planner to solve cyber defense problems characterized as partially observable Markov decision problems (POMDPs).  ...  Belief states are efficiently approximated and updated using particle filters.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.08957v1">arXiv:2002.08957v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rakhpiufdve4rorxi5o45rhlqy">fatcat:rakhpiufdve4rorxi5o45rhlqy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321102744/https://arxiv.org/ftp/arxiv/papers/2002/2002.08957.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.08957v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A Security Perspective on Battery Systems of the Internet of Things

Anthony Bahadir Lopez, Korosh Vatanparvar, Atul Prasad Deb Nath, Shuo Yang, Swarup Bhunia, Mohammad Abdullah Al Faruque
<span title="2017-05-10">2017</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qegv3ly7vffgbnwqhz2hqoueu4" style="color: black;">Journal of Hardware and Systems Security</a> </i> &nbsp;
We divide the battery system into the Physical, Battery Management System, and Application layers and use mobile systems and cyber-physical systems as case studies for IoT applications.  ...  A security analysis is necessary for system manufacturers and users to understand what threats and solutions exist for battery system security.  ...  These solutions include both diagnostic and prognostic approaches, e.g., with Kalman filter, particle filter, neural networks, parametric modeling, mapping, etc. [43] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s41635-017-0007-0">doi:10.1007/s41635-017-0007-0</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/jhss/LopezVNYBF17.html">dblp:journals/jhss/LopezVNYBF17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5d3jv5eirndihhhlwihubqhzxe">fatcat:5d3jv5eirndihhhlwihubqhzxe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190303041538/http://pdfs.semanticscholar.org/af11/e43c307cf6ba1e6d41a2246ba570bb8ceccf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/11/af11e43c307cf6ba1e6d41a2246ba570bb8ceccf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s41635-017-0007-0"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
<span title="2022-05-24">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Specifically, the paper i) introduces the background of the smart grid; ii) reviews external cyber attacks from attack incidents and attack methods; iii) introduces critical defense approaches in industrial  ...  cyber systems, which include device identification, vulnerability discovery, intrusion detection systems (IDSs), honeypots, attribution, and threat intelligence (TI); iv) reviews the relevant content  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.11783v1">arXiv:2205.11783v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fz43u2e6g5gyfepqz44tezelba">fatcat:fz43u2e6g5gyfepqz44tezelba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220529215441/https://arxiv.org/pdf/2205.11783v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e7/8a/e78a270bca07ee3fe0923a98a9e0fdf9a7a092e1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.11783v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Verification of Localization via Blockchain Technology on Unmanned Aerial Vehicle Swarm

Mustafa Cosar, Harun Emre Kiran
<span title="">2021</span> <i title="Central Library of the Slovak Academy of Sciences"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rsgu6oqy7fcfdl4hs633t7yefy" style="color: black;">Computing and informatics</a> </i> &nbsp;
Cyber-attacks on unmanned aerial vehicles (UAV) in a swarm can affect their position and cause various damages.  ...  In order to avoid this challenge, it is necessary to share with each other the positions of UAV in the swarm and to increase their accuracy.  ...  For example, battery life, energy consumption values, physical and cyber-attacks [21] . There are many types of cyber-attacks on UAV networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31577/cai_2021_2_428">doi:10.31577/cai_2021_2_428</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vfnnj322pjbzranowrzeiejfyi">fatcat:vfnnj322pjbzranowrzeiejfyi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211016100908/http://www.cai.sk/ojs/index.php/cai/article/download/2021_2_428/1090" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f6/19/f619da62c6013ad787e3d62badf5710acb38c84e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.31577/cai_2021_2_428"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems

Athira M. Mohan, Nader Meskin, Hasan Mehrjerdi
<span title="2020-07-28">2020</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a2yvk5xhdnhpxjnk6yd33uudqq" style="color: black;">Energies</a> </i> &nbsp;
In this paper, a comprehensive review of the cyber-security of the LFC mechanism in the power system is presented.  ...  them more vulnerable to disturbances and cyber-attacks.  ...  AGC system with non-linearities like time-delay and governor dead-band is equipped with a detection scheme using a particle filter-based approach and sequential importance sampling (SIS) algorithm in  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/en13153860">doi:10.3390/en13153860</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n6ti4xjikfhcnlusrmmlhxj2fq">fatcat:n6ti4xjikfhcnlusrmmlhxj2fq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200813214813/https://res.mdpi.com/d_attachment/energies/energies-13-03860/article_deploy/energies-13-03860.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/e1/70e14fc2a83ed4e58f9356499f4d14394bf2d763.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/en13153860"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain [article]

Ihai Rosenberg and Asaf Shabtai and Yuval Elovici and Lior Rokach
<span title="2021-03-13">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
However, machine learning systems are vulnerable to adversarial attacks, and this limits the application of machine learning, especially in non-stationary, adversarial environments, such as the cyber security  ...  Then, we categorize the applications of adversarial attack and defense methods in the cyber security domain.  ...  The CNN model uses multiple filters (with varying window sizes) to obtain multiple features.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.02407v3">arXiv:2007.02407v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rj3qomvg4bfb5p3atsct4winji">fatcat:rj3qomvg4bfb5p3atsct4winji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200710053418/https://arxiv.org/pdf/2007.02407v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.02407v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Research on a PSO-H-SVM-Based Intrusion Detection Method for Industrial Robotic Arms

Yulin Zhou, Lun Xie, Hang Pan
<span title="2022-03-08">2022</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
However, with the benefits come risks that have been overlooked, and robotic arms have become a heavily attacked area.  ...  In addition, a response mechanism is proposed on the basis of the intrusion detection system to make protection measures for the robotic arm system.  ...  The entire production system that relies on robotic arms is becoming more and more open, so cyber-physical Appl. Sci. 2022, 12, 2765 2 of 19 security for robotic arm systems is of vital importance.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app12062765">doi:10.3390/app12062765</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7duac5wus5a3hct7omdollskme">fatcat:7duac5wus5a3hct7omdollskme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220309153840/https://mdpi-res.com/d_attachment/applsci/applsci-12-02765/article_deploy/applsci-12-02765.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/42/75/42750988db0db5f85d66652727d6152f1ffae0c7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app12062765"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

A Comprehensive Survey on Intrusion Detection based Machine Learning for IoT Networks

Hela Mliki, Abir Kaceam, Lamia Chaari
<span title="2021-10-06">2021</span> <i title="European Alliance for Innovation n.o."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sfw6e4bmgrh6rkjkiiddq77y3m" style="color: black;">EAI Endorsed Transactions on Security and Safety</a> </i> &nbsp;
The IoT could collect sensitive data and should be able to face attacks and privacy issues. The IoT security issue is a hot topic of research and industrial concern.  ...  This paper also compared between the different intrusion detection techniques and established a taxonomy of machine leaning methods for intrusion detection solutions. system and the cloud exchange data  ...  Binary Particle Swarm Optimization. Binary Particle Swarm Optimization (BPSO) is a wrapper method.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.6-10-2021.171246">doi:10.4108/eai.6-10-2021.171246</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jlunx7derzdezfdiso4xftsocq">fatcat:jlunx7derzdezfdiso4xftsocq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211013195132/https://eudl.eu/pdf/10.4108/eai.6-10-2021.171246" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/41/b141ee2d089f2cb916ab05732a515b608a3c6f53.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/eai.6-10-2021.171246"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Tackling Faults in the Industry 4.0 Era—A Survey of Machine-Learning Solutions and Key Aspects

Angelos Angelopoulos, Emmanouel T. Michailidis, Nikolaos Nomikos, Panagiotis Trakadas, Antonis Hatziefremidis, Stamatis Voliotis, Theodore Zahariadis
<span title="2019-12-23">2019</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
In addition, as faults might also occur from sources beyond machine degradation, the potential of ML in safeguarding cyber-security is thoroughly discussed.  ...  We start by examining various proposed cloud/fog/edge architectures, highlighting their importance for acquiring manufacturing data in order to train the ML algorithms.  ...  An ML approach to physical data was proposed in Reference [87] for cyber-physical attack detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20010109">doi:10.3390/s20010109</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/31878065">pmid:31878065</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC6983262/">pmcid:PMC6983262</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n4muoguq5jalrfwqkq4264vswe">fatcat:n4muoguq5jalrfwqkq4264vswe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191225014543/https://res.mdpi.com/d_attachment/sensors/sensors-20-00109/article_deploy/sensors-20-00109.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f8/09/f809e88856f3baff1b0e104cf907d87ad3a067ec.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s20010109"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6983262" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

2020 Index IEEE Transactions on Cybernetics Vol. 50

<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/snhjqrgxbff5teva5lfasxmfr4" style="color: black;">IEEE Transactions on Cybernetics</a> </i> &nbsp;
., Reference Trajectory Reshaping Optimi-zation and Control of Robotic Exoskeletons for Human-Robot Co-Manipulation; TCYB Aug. 2020 3740-3751 Wu, X., Jiang, B., Yu, K., Miao, c., and Chen, H  ...  Pratama, M., +, TCYB Feb. 2020 664-677 Cyber-physical systems Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks.  ...  ., +, Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tcyb.2020.3047216">doi:10.1109/tcyb.2020.3047216</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5giw32c2u5h23fu4drupnh644a">fatcat:5giw32c2u5h23fu4drupnh644a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210429110028/https://ieeexplore.ieee.org/ielx7/6221036/9279348/09306861.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/20/94/20941b2f124ba80ea00284d65572d4aba4055b25.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tcyb.2020.3047216"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics

Dimitrios Pliatsios, Panagiotis Sarigiannidis, Thomas Lagkas, Antonios G. Sarigiannidis
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b4kxurpz5vbn7gog6wq32vliii" style="color: black;">IEEE Communications Surveys and Tutorials</a> </i> &nbsp;
Security considerations for SCADA systems are gaining higher attention, as the number of security incidents against these critical infrastructures is increasing.  ...  Furthermore, we carry out an extensive review of the security proposals and tactics that aim to secure SCADA systems. We also discuss the state of SCADA system security.  ...  DETERLab [81] is a large-scale emulation facility for cyber-physical systems, geared towards cyber-security experimentation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2020.2987688">doi:10.1109/comst.2020.2987688</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2z346mmksvdixjy2uzjbajbgoe">fatcat:2z346mmksvdixjy2uzjbajbgoe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718042923/https://ieeexplore.ieee.org/ielx7/9739/9173582/09066892.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d8/8e/d88e155794c2824123c0dec2ad1cb4a10827ec54.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/comst.2020.2987688"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

2020 Index IEEE Transactions on Industrial Informatics Vol. 16

<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lxfdtuyn4nhhtevm3datmysrpa" style="color: black;">IEEE Transactions on Industrial Informatics</a> </i> &nbsp;
2020 5617-5625 Iriondo, N., see Sarachaga, I., 1460-1469 1904-1913 Jia, P., Wang, X., and Zheng, K., Distributed Clock Synchronization Based on Intelligent Clustering in Local Area Industrial IoT Systems  ...  see Qin, Y., TII Jan. 2020 238-247 Jiang, H., see Ruan, J., 1296-1309 Jiang, H., Ren, J., Lui, J.C.S., and Dustdar, S., Guest Editorial:Special Section on End-Edge-Cloud Orchestrated Algorithms, Systems  ...  ., +, TII June 2020 3744-3756 Control system security Resilient Model Predictive Control of Cyber-Physical Systems Under DoS Attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tii.2021.3053362">doi:10.1109/tii.2021.3053362</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/blfvdtsc3fdstnk6qoaazskd3i">fatcat:blfvdtsc3fdstnk6qoaazskd3i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210224025552/https://ieeexplore.ieee.org/ielx7/9424/9201572/09353707.pdf?tp=&amp;arnumber=9353707&amp;isnumber=9201572&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tii.2021.3053362"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 426 results