UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks Journal article
Li, Sheng, Zou, Wencheng, Guo, Jian, Xiang, Zhengrong. Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks[J]. IEEE Systems Journal, 2022, 16(3), 4423-4432.
Authors:  Li, Sheng;  Zou, Wencheng;  Guo, Jian;  Xiang, Zhengrong
Favorite | TC[WOS]:24 TC[Scopus]:23  IF:4.0/3.9 | Submit date:2022/05/13
Actuators  Consensus Protocol  Cyber Attacks  Cyberattack  Denial-of-service Attack  Fault Tolerant Systems  Fault-tolerant Consensus  Multiagent Systems (Mas)  Security Control  Switched Systems  Switches  Topology  
General resilient consensus algorithms Journal article
Guilherme Ramos, Daniel Silvestre, Carlos Silvestre. General resilient consensus algorithms[J]. International Journal of Control, 2022, 95(6), 1482-1496.
Authors:  Guilherme Ramos;  Daniel Silvestre;  Carlos Silvestre
Favorite | TC[WOS]:22 TC[Scopus]:18  IF:1.6/1.8 | Submit date:2021/03/09
Consensus  Resilient Consensus  Multi-agent Systems  Cyber-security  
PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification Conference paper
Lin, Peng, Hu, Yishen, Lin, Yanying, Ye, Kejiang, Xu, Cheng Zhong. PEAN: A Packet-level End-to-end Attentive Network for Encrypted Traffic Identification[C], 2022, 267-274.
Authors:  Lin, Peng;  Hu, Yishen;  Lin, Yanying;  Ye, Kejiang;  Xu, Cheng Zhong
Favorite | TC[Scopus]:1 | Submit date:2022/08/05
Cyber Security  Encrypted Traffic Identification  Traffic Classification  
Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China Journal article
Ramaswamy, M.P.. Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China[J]. Fiat Iustitia, 2020, 163-175.
Authors:  Ramaswamy, M.P.
Favorite |  | Submit date:2022/08/24
Efficiency  Efficacy  Norms  Assessment  Cyber-security  Greater Bay Area  
Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China Journal article
Ramaswamy, M.P.. Efficacy and Efficiency of Laws: Some Thoughts on the Conceptual Underpinnings and Assessing Cybersecurity Laws in the Greater Bay Area Economic Region of Southern China[J]. Fiat Iustitia, 2020, 163-175.
Authors:  Ramaswamy, M.P.
Favorite |  | Submit date:2022/08/24
Efficiency  Efficacy  Norms  Assessment  Cyber-security  Greater Bay Area  
A Modular Approach for Implementation of Honeypots in Cyber Security Journal article
Muneeb Mirza, Muhammad Usman, Robert P. Biuk-Aghai, Simon Fong. A Modular Approach for Implementation of Honeypots in Cyber Security[J]. International Journal of Applied Engineering Research, 2016, 11(8), 5446-5451.
Authors:  Muneeb Mirza;  Muhammad Usman;  Robert P. Biuk-Aghai;  Simon Fong
Favorite |  | Submit date:2019/02/13
Honeypots  Intrusion Detection System  Antimalware  Signature  Cyber Security  Network Security  Antivirus  
On false data-injection attacks against power system state estimation: Modeling and countermeasures Journal article
Yang Q., Yang J., Yu W., An D., Zhang N., Zhao W.. On false data-injection attacks against power system state estimation: Modeling and countermeasures[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(3), 717.
Authors:  Yang Q.;  Yang J.;  Yu W.;  An D.;  Zhang N.; et al.
Favorite | TC[WOS]:290 TC[Scopus]:359 | Submit date:2018/10/30
Cyber Security  Cyber-physical Systems  Power Grid  State Estimation