These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

165 related articles for article (PubMed ID: 29994695)

  • 1. Optimal Data Injection Attacks in Cyber-Physical Systems.
    Wu G; Sun J; Chen J
    IEEE Trans Cybern; 2018 Dec; 48(12):3302-3312. PubMed ID: 29994695
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Kullback-Leibler Divergence-Based Optimal Stealthy Sensor Attack Against Networked Linear Quadratic Gaussian Systems.
    Ren XX; Yang GH
    IEEE Trans Cybern; 2022 Nov; 52(11):11539-11548. PubMed ID: 33872173
    [TBL] [Abstract][Full Text] [Related]  

  • 3. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint.
    Li F; Tang Y
    IEEE Trans Cybern; 2020 Feb; 50(2):729-738. PubMed ID: 30307888
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
    Zhou Y; Vamvoudakis KG; Haddad WM; Jiang ZP
    IEEE Trans Cybern; 2021 Sep; 51(9):4648-4660. PubMed ID: 32735543
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Security tracking control for discrete-time stochastic systems subject to cyber attacks.
    Yu Y; Liu GP; Hu W
    ISA Trans; 2022 Aug; 127():133-145. PubMed ID: 35216807
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Optimal Stealthy Deception Attack Against Cyber-Physical Systems.
    Zhang Q; Liu K; Xia Y; Ma A
    IEEE Trans Cybern; 2020 Sep; 50(9):3963-3972. PubMed ID: 31071059
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective.
    Huang Y; Zhao J
    IEEE Trans Cybern; 2024 Jan; 54(1):162-172. PubMed ID: 36446001
    [TBL] [Abstract][Full Text] [Related]  

  • 9. False data injection against state estimation in power systems with multiple cooperative attackers.
    Yan J; Guo F; Wen C
    ISA Trans; 2020 Jun; 101():225-233. PubMed ID: 32057420
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements.
    Cheng Z; Yang L; Yuan Q; Long Y; Ren H
    Sensors (Basel); 2024 Jun; 24(13):. PubMed ID: 39000850
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.
    Tahoun AH; Arafa M
    ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach.
    Li YG; Yang GH; Wang X
    ISA Trans; 2023 Jun; 137():1-12. PubMed ID: 36725413
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Resilient Tracking Control of Networked Control Systems Under Cyber Attacks.
    Mousavinejad E; Ge X; Han QL; Yang F; Vlacic L
    IEEE Trans Cybern; 2021 Apr; 51(4):2107-2119. PubMed ID: 31722506
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost.
    Jin K; Ye D
    IEEE Trans Cybern; 2024 Feb; 54(2):787-796. PubMed ID: 37015631
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Critic-only adaptive dynamic programming algorithms' applications to the secure control of cyber-physical systems.
    Jiang H; Zhang H; Xie X
    ISA Trans; 2020 Sep; 104():138-144. PubMed ID: 30853105
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Resilient control design for networked DC microgrids under time-constrained DoS attacks.
    Hu S; Yang F; Gorbachev S; Yue D; Kuzin V; Deng C
    ISA Trans; 2022 Aug; 127():197-205. PubMed ID: 35279309
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
    Ye D; Zhang TY
    IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach.
    Yuan Y; Yuan H; Ho DWC; Guo L
    IEEE Trans Cybern; 2020 Jan; 50(1):48-60. PubMed ID: 30369460
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Reliable cooperative control and plug-and-play operation for networked heterogeneous systems under cyber-physical attacks.
    Huang X; Dong J
    ISA Trans; 2020 Sep; 104():62-72. PubMed ID: 31690455
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 9.