These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

308 related articles for article (PubMed ID: 29994687)

  • 1. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.
    Tahoun AH; Arafa M
    ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Adaptive bounded neural network control for coordinated path-following of networked underactuated autonomous surface vehicles under time-varying state-dependent cyber-attack.
    Gu N; Wang D; Peng Z; Liu L
    ISA Trans; 2020 Sep; 104():212-221. PubMed ID: 30832988
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.
    Tahoun AH; Arafa M
    ISA Trans; 2022 Sep; 128(Pt B):294-308. PubMed ID: 34953583
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
    Zhou Y; Vamvoudakis KG; Haddad WM; Jiang ZP
    IEEE Trans Cybern; 2021 Sep; 51(9):4648-4660. PubMed ID: 32735543
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.
    Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L
    IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Resilient Tracking Control of Networked Control Systems Under Cyber Attacks.
    Mousavinejad E; Ge X; Han QL; Yang F; Vlacic L
    IEEE Trans Cybern; 2021 Apr; 51(4):2107-2119. PubMed ID: 31722506
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks.
    Huang X; Dong J
    IEEE Trans Cybern; 2018 Dec; 48(12):3432-3439. PubMed ID: 29994296
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Secure Estimation for Cyber-Physical Systems via Sliding Mode.
    Wu C; Hu Z; Liu J; Wu L
    IEEE Trans Cybern; 2018 Dec; 48(12):3420-3431. PubMed ID: 29994041
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.
    Xun P; Zhu PD; Hu YF; Cui PS; Zhang Y
    Sensors (Basel); 2017 Oct; 17(10):. PubMed ID: 29065461
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optimal Data Injection Attacks in Cyber-Physical Systems.
    Wu G; Sun J; Chen J
    IEEE Trans Cybern; 2018 Dec; 48(12):3302-3312. PubMed ID: 29994695
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Data-Driven Methods for Stealthy Attacks on TCP/IP-Based Networked Control Systems Equipped With Attack Detectors.
    Wang JS; Yang GH
    IEEE Trans Cybern; 2019 Aug; 49(8):3020-3031. PubMed ID: 29994347
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Distributed fault detection and isolation in second order networked systems in a cyber-physical environment.
    Khan AS; Khan AQ; Iqbal N; Sarwar M; Mahmood A; Shoaib MA
    ISA Trans; 2020 Aug; 103():131-142. PubMed ID: 32197759
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms.
    Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N
    J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks.
    Huang X; Dong J
    ISA Trans; 2020 Sep; 104():62-72. PubMed ID: 31690455
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Comprehensive Study of Cyber Attack Mitigation with the Exchange of Frequency Containment Reserves Control in a Multi-Infeed Direct Current Power System.
    Ramadhan UF; Lee J; Yoon M
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850561
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Detection and mitigation of coordinated cyber-physical attack in CPPS.
    Sree Varshini GY; Latha S
    Heliyon; 2024 Feb; 10(4):e26332. PubMed ID: 38420452
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Ă–zer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Fast Attack Detection for Cyber-Physical Systems Using Dynamic Data Encryption.
    Li T; Chen B; Liu S; Wang Z; Zhang WA; Yu L
    IEEE Trans Cybern; 2024 May; 54(5):3251-3264. PubMed ID: 38055362
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 16.