These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

107 related articles for article (PubMed ID: 38055362)

  • 1. Fast Attack Detection for Cyber-Physical Systems Using Dynamic Data Encryption.
    Li T; Chen B; Liu S; Wang Z; Zhang WA; Yu L
    IEEE Trans Cybern; 2024 May; 54(5):3251-3264. PubMed ID: 38055362
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems.
    Ye D; Zhang TY
    IEEE Trans Cybern; 2020 Jun; 50(6):2338-2345. PubMed ID: 31170086
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Dynamic-Memory Event-Based Asynchronous Attack Detection Filtering for a Class Of Nonlinear Cyber-Physical Systems.
    Xing M; Wang Y; Pang Q; Zhuang G
    IEEE Trans Cybern; 2023 Jan; 53(1):653-667. PubMed ID: 35604986
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication.
    Obaidat M; Brown J; Obeidat S; Rawashdeh M
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32751189
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection.
    Chen X; Wang Q; Fan L; Yu S
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981364
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
    Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
    Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels.
    Tahoun AH; Arafa M
    ISA Trans; 2022 Sep; 128(Pt B):294-308. PubMed ID: 34953583
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems.
    Guo H; Sun J; Pang ZH
    ISA Trans; 2022 Aug; 127():32-40. PubMed ID: 35292173
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects.
    Dong L; Xu H; Wei X; Hu X
    ISA Trans; 2022 Apr; 123():1-13. PubMed ID: 34092392
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detection, differentiation and localization of replay attack and false data injection attack based on random matrix.
    Shen Y; Qin Z
    Sci Rep; 2024 Feb; 14(1):2758. PubMed ID: 38307898
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Efficient Storage and Encryption of 32-Slice CT Scan Images Using Phase Grating.
    Patra A; Saha A; Bhattacharya K
    Arab J Sci Eng; 2023; 48(2):1757-1770. PubMed ID: 35765311
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes.
    Zhu S; Wang G; Zhu C
    Entropy (Basel); 2019 Aug; 21(8):. PubMed ID: 33267503
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.
    Tahoun AH; Arafa M
    ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Active Interdiction Defence Scheme Against False Data-Injection Attacks: A Stackelberg Game Perspective.
    Huang Y; Zhao J
    IEEE Trans Cybern; 2024 Jan; 54(1):162-172. PubMed ID: 36446001
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
    Li J; Qiao Z; Zhang K; Cui C
    Sensors (Basel); 2021 Jan; 21(1):. PubMed ID: 33406662
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Adaptive neural network control for nonlinear cyber-physical systems subject to false data injection attacks with prescribed performance.
    Liu Z; Tang J; Zhao Z; Zhang S
    Philos Trans A Math Phys Eng Sci; 2021 Oct; 379(2207):20200372. PubMed ID: 34398648
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks.
    Wan Y; Cao J
    Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112353
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.