These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
149 related articles for article (PubMed ID: 36725897)
41. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids. Zhang L; Tang S; Luo H PLoS One; 2016; 11(3):e0151253. PubMed ID: 27007951 [TBL] [Abstract][Full Text] [Related]
42. A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication. Obaidat M; Brown J; Obeidat S; Rawashdeh M Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32751189 [TBL] [Abstract][Full Text] [Related]
43. An Efficient Interface for the Integration of IoT Devices with Smart Grids. Viel F; Augusto Silva L; Leithardt VRQ; De Paz Santana JF; Celeste Ghizoni Teive R; Albenes Zeferino C Sensors (Basel); 2020 May; 20(10):. PubMed ID: 32429513 [TBL] [Abstract][Full Text] [Related]
44. A Methodology for Modeling Interoperability of Smart Sensors in Smart Grids. Song EY; FitzPatrick GJ; Lee KB; Griffor E IEEE Trans Smart Grid; 2022 Jan; 13(1):. PubMed ID: 37964770 [TBL] [Abstract][Full Text] [Related]
45. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. Amin R; Islam SK; Biswas GP; Khan MK; Obaidat MS J Med Syst; 2015 Nov; 39(11):137. PubMed ID: 26324169 [TBL] [Abstract][Full Text] [Related]
46. BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. Papathanasiou A; Liontos G; Paparis G; Liagkou V; Glavas E Sensors (Basel); 2024 Mar; 24(5):. PubMed ID: 38475211 [TBL] [Abstract][Full Text] [Related]
47. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems. Umar S; Felemban M Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446 [TBL] [Abstract][Full Text] [Related]
48. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. Tahoun AH; Arafa M ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167 [TBL] [Abstract][Full Text] [Related]
49. False data injection against state estimation in power systems with multiple cooperative attackers. Yan J; Guo F; Wen C ISA Trans; 2020 Jun; 101():225-233. PubMed ID: 32057420 [TBL] [Abstract][Full Text] [Related]
50. Emerging Cybersecurity Threats in Radiation Oncology. Joyce C; Roman FL; Miller B; Jeffries J; Miller RC Adv Radiat Oncol; 2021; 6(6):100796. PubMed ID: 34746516 [TBL] [Abstract][Full Text] [Related]
51. Codesign of FDI Attacks Detection, Isolation, and Mitigation for Complex Microgrid Systems: An HBF-NN-Based Approach. Tian E; Wu Z; Xie X IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6156-6165. PubMed ID: 37015670 [TBL] [Abstract][Full Text] [Related]
52. Interconnected and resilient: A CGE analysis of AI-driven cyberattacks in global trade. Osman R; El-Gendy S Risk Anal; 2024 Jun; ():. PubMed ID: 38837258 [TBL] [Abstract][Full Text] [Related]
53. Detection of False Data Injection Attacks in Smart Grids Based on Expectation Maximization. Hu P; Gao W; Li Y; Wu M; Hua F; Qiao L Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772723 [TBL] [Abstract][Full Text] [Related]
54. Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks. Liu J; Yin T; Yue D; Karimi HR; Cao J IEEE Trans Cybern; 2021 Jan; 51(1):162-173. PubMed ID: 32086233 [TBL] [Abstract][Full Text] [Related]
55. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks. Abu Al-Haija Q Front Big Data; 2021; 4():782902. PubMed ID: 35098112 [TBL] [Abstract][Full Text] [Related]
56. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks. Chen B; Ho DWC; Hu G; Yu L; Bo Chen ; Ho DWC; Guoqiang Hu ; Li Yu ; Chen B; Ho DWC; Hu G; Yu L IEEE Trans Cybern; 2018 Jun; 48(6):1862-1876. PubMed ID: 28682270 [TBL] [Abstract][Full Text] [Related]
57. Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. Rashid MM; Kamruzzaman J; Hassan MM; Imam T; Gordon S Int J Environ Res Public Health; 2020 Dec; 17(24):. PubMed ID: 33327468 [TBL] [Abstract][Full Text] [Related]
58. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units. Almasabi S; Alsuwian T; Javed E; Irfan M; Jalalah M; Aljafari B; Harraz FA Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502682 [TBL] [Abstract][Full Text] [Related]
59. Impact of cyberattacks on safety and stability of connected and automated vehicle platoons under lane changes. Khattak ZH; Smith BL; Fontaine MD Accid Anal Prev; 2021 Feb; 150():105861. PubMed ID: 33445034 [TBL] [Abstract][Full Text] [Related]
60. A Secure Charging System for Electric Vehicles Based on Blockchain. Kim M; Park K; Yu S; Lee J; Park Y; Lee SW; Chung B Sensors (Basel); 2019 Jul; 19(13):. PubMed ID: 31324058 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]