These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
145 related articles for article (PubMed ID: 31092968)
1. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. Giraldo J; Urbina D; Cardenas A; Valente J; Faisal M; Ruths J; Tippenhauer NO; Sandberg H; Candell R ACM Comput Surv; 2018; 51():. PubMed ID: 31092968 [TBL] [Abstract][Full Text] [Related]
2. A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study. Ramotsoela D; Abu-Mahfouz A; Hancke G Sensors (Basel); 2018 Aug; 18(8):. PubMed ID: 30071595 [TBL] [Abstract][Full Text] [Related]
3. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Derhab A; Guerroumi M; Gumaei A; Maglaras L; Ferrag MA; Mukherjee M; Khan FA Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31311136 [TBL] [Abstract][Full Text] [Related]
4. Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey. Albasheer H; Md Siraj M; Mubarakali A; Elsier Tayfour O; Salih S; Hamdan M; Khan S; Zainal A; Kamarudeen S Sensors (Basel); 2022 Feb; 22(4):. PubMed ID: 35214394 [TBL] [Abstract][Full Text] [Related]
5. Cyber-physical systems security: Limitations, issues and future trends. Yaacoub JA; Salman O; Noura HN; Kaaniche N; Chehab A; Malli M Microprocess Microsyst; 2020 Sep; 77():103201. PubMed ID: 32834204 [TBL] [Abstract][Full Text] [Related]
6. Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Yin XC; Liu ZG; Nkenyereye L; Ndibanje B Sensors (Basel); 2019 Nov; 19(22):. PubMed ID: 31739400 [TBL] [Abstract][Full Text] [Related]
7. A survey on attack detection, estimation and control of industrial cyber-physical systems. Zhang D; Wang QG; Feng G; Shi Y; Vasilakos AV ISA Trans; 2021 Oct; 116():1-16. PubMed ID: 33581894 [TBL] [Abstract][Full Text] [Related]
8. Correlation-Based Anomaly Detection in Industrial Control Systems. Jadidi Z; Pal S; Hussain M; Nguyen Thanh K Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772600 [TBL] [Abstract][Full Text] [Related]
9. Dataset of anomalies and malicious acts in a cyber-physical subsystem. Laso PM; Brosset D; Puentes J Data Brief; 2017 Oct; 14():186-191. PubMed ID: 28795096 [TBL] [Abstract][Full Text] [Related]
10. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems. Chen J; Liu B; Li T; Hu Y Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850552 [TBL] [Abstract][Full Text] [Related]
11. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems. Umar S; Felemban M Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446 [TBL] [Abstract][Full Text] [Related]
12. Generating ICS Anomaly Data Reflecting Cyber-Attack Based on Systematic Sampling and Linear Regression. Lee JH; Ji IH; Jeon SH; Seo JT Sensors (Basel); 2023 Dec; 23(24):. PubMed ID: 38139701 [TBL] [Abstract][Full Text] [Related]
13. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems. Ye D; Zhang TY IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086 [TBL] [Abstract][Full Text] [Related]
14. A Novel Cyber Attack Detection Method in Networked Control Systems. Mousavinejad E; Yang F; Han QL; Vlacic L IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687 [TBL] [Abstract][Full Text] [Related]
15. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment. Ashok A; Hahn A; Govindarasu M J Adv Res; 2014 Jul; 5(4):481-9. PubMed ID: 25685516 [TBL] [Abstract][Full Text] [Related]
16. Decentralized Real-Time Anomaly Detection in Cyber-Physical Production Systems under Industry Constraints. Goetz C; Humm B Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177411 [TBL] [Abstract][Full Text] [Related]
17. A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. Dutta V; ChoraĆ M; Pawlicki M; Kozik R Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824187 [TBL] [Abstract][Full Text] [Related]
18. Detecting Cyber Attacks In-Vehicle Diagnostics Using an Intelligent Multistage Framework. Awaad TA; El-Kharashi MW; Taher M; Tawfik A Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37765997 [TBL] [Abstract][Full Text] [Related]
19. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review. Mohsin AH; Zaidan AA; Zaidan BB; Albahri AS; Albahri OS; Alsalem MA; Mohammed KI J Med Syst; 2018 Oct; 42(12):238. PubMed ID: 30327939 [TBL] [Abstract][Full Text] [Related]
20. A Survey of Advanced Border Gateway Protocol Attack Detection Techniques. Scott BA; Johnstone MN; Szewczyk P Sensors (Basel); 2024 Oct; 24(19):. PubMed ID: 39409453 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]