These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

121 related articles for article (PubMed ID: 35590835)

  • 1. False Data Injection Detection for Phasor Measurement Units.
    Almasabi S; Alsuwian T; Awais M; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35590835
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units.
    Almasabi S; Alsuwian T; Javed E; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502682
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Detection of False Data Injection Attacks in Smart Grids Based on Expectation Maximization.
    Hu P; Gao W; Li Y; Wu M; Hua F; Qiao L
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772723
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays.
    Cheng Z; Ren H; Qin J; Lu R
    IEEE Trans Cybern; 2023 Apr; 53(4):2087-2096. PubMed ID: 34543217
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 7. False data injection against state estimation in power systems with multiple cooperative attackers.
    Yan J; Guo F; Wen C
    ISA Trans; 2020 Jun; 101():225-233. PubMed ID: 32057420
    [TBL] [Abstract][Full Text] [Related]  

  • 8. False Data-Injection Attack Detection in Cyber-Physical Systems With Unknown Parameters: A Deep Reinforcement Learning Approach.
    Liu K; Zhang H; Zhang Y; Sun C
    IEEE Trans Cybern; 2023 Nov; 53(11):7115-7125. PubMed ID: 37015355
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Cyber-attack method and perpetrator prediction using machine learning algorithms.
    Bilen A; Özer AB
    PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems.
    Wang W; Harrou F; Bouyeddou B; Senouci SM; Sun Y
    Cluster Comput; 2022; 25(1):561-578. PubMed ID: 34629940
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Machine Learning Methods for Attack Detection in the Smart Grid.
    Ozay M; Esnaola I; Yarman Vural FT; Kulkarni SR; Poor HV
    IEEE Trans Neural Netw Learn Syst; 2016 Aug; 27(8):1773-86. PubMed ID: 25807571
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detecting and Localizing Cyber-Physical Attacks in Water Distribution Systems without Records of Labeled Attacks.
    Housh M; Kadosh N; Haddad J
    Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015800
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.
    Wan Y; Cao J
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353
    [TBL] [Abstract][Full Text] [Related]  

  • 15. A survey on attack detection, estimation and control of industrial cyber-physical systems.
    Zhang D; Wang QG; Feng G; Shi Y; Vasilakos AV
    ISA Trans; 2021 Oct; 116():1-16. PubMed ID: 33581894
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
    Ye D; Zhang TY
    IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Radial basis function for fast voltage stability assessment using Phasor Measurement Units.
    Gonzalez JW; Isaac IA; Lopez GJ; Cardona HA; Salazar GJ; Rincon JM
    Heliyon; 2019 Nov; 5(11):e02704. PubMed ID: 31840121
    [TBL] [Abstract][Full Text] [Related]  

  • 18. The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.
    Yu B; Wang Z; Liu S; Liu X; Gou R
    PLoS One; 2020; 15(10):e0237994. PubMed ID: 33027298
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Detecting security attacks in cyber-physical systems: a comparison of Mule and WSO2 intelligent IoT architectures.
    Roldán-Gómez J; Boubeta-Puig J; Pachacama-Castillo G; Ortiz G; Martínez JL
    PeerJ Comput Sci; 2021; 7():e787. PubMed ID: 34901434
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
    Chen Y; Hayawi K; Zhao Q; Mou J; Yang L; Tang J; Li Q; Wen H
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146137
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.