Related references
Note: Only part of the references are listed.PDDL: Proactive Distributed Detection and Localization Against Stealthy Deception Attacks in DC Microgrids
Mengxiang Liu et al.
IEEE TRANSACTIONS ON SMART GRID (2023)
Blending Data and Physics Against False Data Injection Attack: An Event-Triggered Moving Target Defence Approach
Wangkun Xu et al.
IEEE TRANSACTIONS ON SMART GRID (2023)
Detecting PLC Intrusions Using Control Invariants
Zeyu Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
A New Explainable Deep Learning Framework for Cyber Threat Discovery in Industrial IoT Networks
Izhar Ahmed Khan et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
Explicit Analysis on Effectiveness and Hiddenness of Moving Target Defense in AC Power Systems
Mengxiang Liu et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2022)
Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids
Mengxiang Liu et al.
IEEE TRANSACTIONS ON SMART GRID (2022)
Reverse Engineering Physical Semantics of PLC Program Variables Using Control Invariants
Zeyu Yang et al.
PROCEEDINGS OF THE TWENTIETH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, SENSYS 2022 (2022)
A Stream Learning Approach for Real-Time Identification of False Data Injection Attacks in Cyber-Physical Power Systems
Ehsan Hallaji et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)
False Data Injection Attack Detection for Industrial Control Systems Based on Both Time- and Frequency-Domain Analysis of Sensor Data
Dajian Huang et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
A Machine Learning Approach for Anomaly Detection in Industrial Control Systems Based on Measurement Data
Sohrab Mokhtari et al.
ELECTRONICS (2021)
Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks
Liang Xiao et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Defending False Data Injection on State Estimation Over Fading Wireless Channels
Saptarshi Ghosh et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems
Martin Higgins et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
Chongrong Fang et al.
AUTOMATICA (2020)
A Recursive Watermark Method for Hard Real-Time Industrial Control System Cyber-Resilience Enhancement
Zhen Song et al.
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2020)
Noise Removal in the Presence of Significant Anomalies for Industrial IoT Sensor Data in Manufacturing
Yuehua Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers
David Formby et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid
Zhenyong Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest
Saeed Ahmed et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Demystifying Arm TrustZone: A Comprehensive Survey
Sandro Pinto et al.
ACM COMPUTING SURVEYS (2019)
The industrial internet of things (IIoT): An analysis framework
Hugh Boyes et al.
COMPUTERS IN INDUSTRY (2018)
Bridging the gap between sensor noise modeling and sensor characterization
Kshitij Jerath et al.
MEASUREMENT (2018)
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS
Chuadhry Mujeeb Ahmed et al.
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) (2018)
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit
Luis A. Garcia et al.
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System
Beibei Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
On the use of open-source firewalls in ICS/SCADA systems
J. Nivethan et al.
INFORMATION SECURITY JOURNAL (2016)
Detecting Integrity Attacks on SCADA Systems
Yilin Mo et al.
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2014)
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications
Justin M. Beaver et al.
2013 12TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2013), VOL 2 (2013)
Determining image origin and integrity using sensor noise
Mo Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)
Analysis and modeling of inertial sensors using Allan variance
Naser EI-Sheimy et al.
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2008)
Stability of networked control systems
W Zhang et al.
IEEE CONTROL SYSTEMS MAGAZINE (2001)