These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

107 related articles for article (PubMed ID: 38307898)

  • 1. Detection, differentiation and localization of replay attack and false data injection attack based on random matrix.
    Shen Y; Qin Z
    Sci Rep; 2024 Feb; 14(1):2758. PubMed ID: 38307898
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Vulnerability analysis and modeling false data injection attack against voltage source converter in renewable generation power system.
    Xing Y; Zhang G; Li J; Bamisile O; Cai D; Huang Q
    ISA Trans; 2023 Dec; 143():492-502. PubMed ID: 37827907
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Fast economic dispatch with false data injection attack in electricity-gas cyber-physical system: A data-driven approach.
    Gao X; Yang X; Meng L; Wang S
    ISA Trans; 2023 Jun; 137():13-22. PubMed ID: 36526449
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Representation-Learning-Based CNN for Intelligent Attack Localization and Recovery of Cyber-Physical Power Systems.
    Lu KD; Zhou L; Wu ZG
    IEEE Trans Neural Netw Learn Syst; 2024 May; 35(5):6145-6155. PubMed ID: 37030822
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment.
    Chen Y; Hayawi K; Zhao Q; Mou J; Yang L; Tang J; Li Q; Wen H
    Sensors (Basel); 2022 Sep; 22(18):. PubMed ID: 36146137
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Resilient Consensus Control Design for DC Microgrids against False Data Injection Attacks Using a Distributed Bank of Sliding Mode Observers.
    Barzegari Y; Zarei J; Razavi-Far R; Saif M; Palade V
    Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408256
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Enhanced Deep Learning Architectures for Face Liveness Detection for Static and Video Sequences.
    Koshy R; Mahmood A
    Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286954
    [TBL] [Abstract][Full Text] [Related]  

  • 9. False data injection against state estimation in power systems with multiple cooperative attackers.
    Yan J; Guo F; Wen C
    ISA Trans; 2020 Jun; 101():225-233. PubMed ID: 32057420
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A Comprehensive Study of Cyber Attack Mitigation with the Exchange of Frequency Containment Reserves Control in a Multi-Infeed Direct Current Power System.
    Ramadhan UF; Lee J; Yoon M
    Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850561
    [TBL] [Abstract][Full Text] [Related]  

  • 11. A Novel Cyber Attack Detection Method in Networked Control Systems.
    Mousavinejad E; Yang F; Han QL; Vlacic L
    IEEE Trans Cybern; 2018 Nov; 48(11):3254-3264. PubMed ID: 29994687
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units.
    Almasabi S; Alsuwian T; Javed E; Irfan M; Jalalah M; Aljafari B; Harraz FA
    Sensors (Basel); 2021 Aug; 21(17):. PubMed ID: 34502682
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Fast Attack Detection for Cyber-Physical Systems Using Dynamic Data Encryption.
    Li T; Chen B; Liu S; Wang Z; Zhang WA; Yu L
    IEEE Trans Cybern; 2024 May; 54(5):3251-3264. PubMed ID: 38055362
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Security Analysis of Distributed Consensus Filtering Under Replay Attacks.
    Huang J; Yang W; Ho DWC; Li F; Tang Y
    IEEE Trans Cybern; 2024 Jun; 54(6):3526-3539. PubMed ID: 37651475
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems.
    Tian J; Wang B; Wang Z; Cao K; Li J; Ozay M
    IEEE Trans Cybern; 2022 Dec; 52(12):13699-13713. PubMed ID: 34797772
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Secure Control of Networked Control Systems Using Dynamic Watermarking.
    Du D; Zhang C; Li X; Fei M; Yang T; Zhou H
    IEEE Trans Cybern; 2022 Dec; 52(12):13609-13622. PubMed ID: 34543220
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays.
    Cheng Z; Ren H; Qin J; Lu R
    IEEE Trans Cybern; 2023 Apr; 53(4):2087-2096. PubMed ID: 34543217
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Detection of False Data Injection Attacks in Smart Grids Based on Expectation Maximization.
    Hu P; Gao W; Li Y; Wu M; Hua F; Qiao L
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772723
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.
    Tahoun AH; Arafa M
    ISA Trans; 2021 Apr; 110():1-14. PubMed ID: 33039167
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack.
    Liu J; Wang Y; Cao J; Yue D; Xie X
    IEEE Trans Cybern; 2021 Aug; 51(8):4000-4010. PubMed ID: 32886621
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.