These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

201 related articles for article (PubMed ID: 33918446)

  • 1. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units.
    Almasabi S; Alsuwian T; Javed E; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502682
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
    Chen Y; Hayawi K; Zhao Q; Mou J; Yang L; Tang J; Li Q; Wen H
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146137
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Fast economic dispatch with false data injection attack in electricity-gas cyber-physical system: A data-driven approach.
    Gao X; Yang X; Meng L; Wang S
    ISA Trans; 2023 Jun; 137():13-22. PubMed ID: 36526449
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Siting and sizing of distributed generators based on improved simulated annealing particle swarm optimization.
    Su H
    Environ Sci Pollut Res Int; 2019 Jun; 26(18):17927-17938. PubMed ID: 29255978
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.
    Ashraf S; Shawon MH; Khalid HM; Muyeen SM
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640735
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Resilient Consensus Control Design for DC Microgrids against False Data Injection Attacks Using a Distributed Bank of Sliding Mode Observers.
    Barzegari Y; Zarei J; Razavi-Far R; Saif M; Palade V
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408256
    [TBL] [Abstract][Full Text] [Related]  

  • 9. False data injection against state estimation in power systems with multiple cooperative attackers.
    Yan J; Guo F; Wen C
    ISA Trans; 2020 Jun; 101():225-233. PubMed ID: 32057420
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems.
    Zhu P; Xun P; Hu Y; Xiong Y
    Sensors (Basel); 2021 Feb; 21(3):. PubMed ID: 33540605
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems.
    Paul S; Ni Z; Mu C
    IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4512-4523. PubMed ID: 31899439
    [TBL] [Abstract][Full Text] [Related]  

  • 12. The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.
    Yu B; Wang Z; Liu S; Liu X; Gou R
    PLoS One; 2020; 15(10):e0237994. PubMed ID: 33027298
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
    Ashok A; Hahn A; Govindarasu M
    J Adv Res; 2014 Jul; 5(4):481-9. PubMed ID: 25685516
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.
    Wang W; Harrou F; Bouyeddou B; Senouci SM; Sun Y
    Cluster Comput; 2022; 25(1):561-578. PubMed ID: 34629940
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A Comprehensive Study of Cyber Attack Mitigation with the Exchange of Frequency Containment Reserves Control in a Multi-Infeed Direct Current Power System.
    Ramadhan UF; Lee J; Yoon M
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850561
    [TBL] [Abstract][Full Text] [Related]  

  • 16. False Data Injection Detection for Phasor Measurement Units.
    Almasabi S; Alsuwian T; Awais M; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590835
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach.
    Yin XC; Liu ZG; Nkenyereye L; Ndibanje B
    Sensors (Basel); 2019 Nov; 19(22):. PubMed ID: 31739400
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Physical-Model-Checking to Detect Switching-Related Attacks in Power Systems.
    El Hariri M; Faddel S; Mohammed O
    Sensors (Basel); 2018 Jul; 18(8):. PubMed ID: 30065218
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.