4.6 Article

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

Related references

Note: Only part of the references are listed.
Article Chemistry, Multidisciplinary

A Secure Architecture to Protect the Network from Replay Attacks during Client-to-Client Data Transmission

Muhammad Nadeem et al.

Summary: This paper discusses cloud computing and data security, and proposes a secure architecture and algorithm implementation to prevent replay attacks.

APPLIED SCIENCES-BASEL (2022)

Article Automation & Control Systems

A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer

Carlos Trapiello et al.

Summary: This paper presents a zonotopic set-invariance analysis of replay attacks targeting the communication network serving the supervisory layer of complex control systems, using an observer-based detection scheme. Two scenarios are considered based on the attacker's access to system resources, with analytical expressions derived for attack detectability under bounded uncertainties. The validity of the analysis is demonstrated through simulations on a quadruple-tank process.

SYSTEMS & CONTROL LETTERS (2021)

Article Engineering, Electrical & Electronic

Privacy Preserving Load Control of Residential Microgrid via Deep Reinforcement Learning

Zhaoming Qin et al.

Summary: This paper proposes a novel privacy preserving load control scheme for residential microgrid, which has been proven to be effective in improving operating efficiency. The developed algorithm integrates deep reinforcement learning and recurrent neural network to address the high-dimensional continuous action space and partial observability of state due to privacy issues. Simulation results verify the superiority and flexibility of the proposed scheme compared with prior methods.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Computer Science, Information Systems

Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System

Muhammad Nadeem et al.

Summary: This article discusses the security issues of cloud computing and defense mechanisms, focusing on monitoring the attack rate of the network using an Intrusion Detection System, and providing various solutions to protect the cloud server from attacks.

IEEE ACCESS (2021)