×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [3]
THE STATE KEY LA... [2]
Faculty of Law [2]
Authors
CARLOS JORGE FER... [1]
FONG SIMON JAMES [1]
CHENGZHONG XU [1]
Document Type
Journal article [6]
Conference paper [1]
Date Issued
2022 [3]
2020 [2]
2016 [1]
2014 [1]
Language
英語English [7]
Source Publication
Fiat Iustitia [2]
2021 IEEE 23rd I... [1]
IEEE Systems Jou... [1]
IEEE Transaction... [1]
International Jo... [1]
International Jo... [1]
More...
Indexed By
SCIE [2]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-7 of 7
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks
Journal article
Li, Sheng, Zou, Wencheng, Guo, Jian, Xiang, Zhengrong. Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks[J]. IEEE Systems Journal, 2022, 16(3), 4423-4432.
Authors:
Li, Sheng
;
Zou, Wencheng
;
Guo, Jian
;
Xiang, Zhengrong
Favorite
|
TC[WOS]:
24
TC[Scopus]:
23
IF:
4.0
/
3.9
|
Submit date:2022/05/13
Actuators
Consensus Protocol
Cyber Attacks
Cyberattack
Denial-of-service Attack
Fault Tolerant Systems
Fault-tolerant Consensus
Multiagent Systems (Mas)
Security Control
Switched Systems
Switches
Topology
General resilient consensus algorithms
Journal article
Guilherme Ramos, Daniel Silvestre, Carlos Silvestre. General resilient consensus algorithms[J]. International Journal of Control, 2022, 95(6), 1482-1496.
Authors:
Guilherme Ramos
;
Daniel Silvestre
;
Carlos Silvestre
Favorite
|
TC[WOS]:
22
TC[Scopus]:
18
IF:
1.6
/
1.8
|
Submit date:2021/03/09
Consensus
Resilient Consensus
Multi-agent Systems
Cyber-security
PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification
Conference paper
Lin, Peng, Hu, Yishen, Lin, Yanying, Ye, Kejiang, Xu, Cheng Zhong. PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification[C], 2022, 267-274.
Authors:
Lin, Peng
;
Hu, Yishen
;
Lin, Yanying
;
Ye, Kejiang
;
Xu, Cheng Zhong
Favorite
|
TC[Scopus]:
1
|
Submit date:2022/08/05
Cyber Security
Encrypted Traffic Identification
Traffic Classification
Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China
Journal article
Ramaswamy, M.P.. Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China[J]. Fiat Iustitia, 2020, 163-175.
Authors:
Ramaswamy, M.P.
Favorite
|
|
Submit date:2022/08/24
Efficiency
Efficacy
Norms
Assessment
Cyber-security
Greater Bay Area
Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China
Journal article
Ramaswamy, M.P.. Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China[J]. Fiat Iustitia, 2020, 163-175.
Authors:
Ramaswamy, M.P.
Favorite
|
|
Submit date:2022/08/24
Efficiency
Efficacy
Norms
Assessment
Cyber-security
Greater Bay Area
A Modular Approach for Implementation of Honeypots in Cyber Security
Journal article
Muneeb Mirza, Muhammad Usman, Robert P. Biuk-Aghai, Simon Fong. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research, 2016, 11(8), 5446-5451.
Authors:
Muneeb Mirza
;
Muhammad Usman
;
Robert P. Biuk-Aghai
;
Simon Fong
Favorite
|
|
Submit date:2019/02/13
Honeypots
Intrusion Detection System
Antimalware
Signature
Cyber Security
Network Security
Antivirus
On false data-injection attacks against power system state estimation: Modeling and countermeasures
Journal article
Yang Q., Yang J., Yu W., An D., Zhang N., Zhao W.. On false data-injection attacks against power system state estimation: Modeling and countermeasures[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(3), 717.
Authors:
Yang Q.
;
Yang J.
;
Yu W.
;
An D.
;
Zhang N.
; et al.
Favorite
|
TC[WOS]:
290
TC[Scopus]:
359
|
Submit date:2018/10/30
Cyber Security
Cyber-physical Systems
Power Grid
State Estimation