Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
44 | Shari Lawrence Pfleeger, Rachel Rue |
Cybersecurity Economic Issues: Clearing the Path to Good Practice. |
IEEE Softw. |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Scott Borg |
Economically Complex Cyberattacks. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
cyberdefense, security, cybersecurity, cyberattack |
36 | Lee Garber |
News Briefs. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
Adobe Flash Player, Linked-In, Google Maps with Street View, Pandora, cloud computing, security policy, compliance, Twitter, Facebook, cybersecurity, cyberattacks, BlackBerry |
36 | Anna Spagnolli, Mariavittoria Masotina, Annalorena Scarcia, Beatrice Zuffi, Luciano Gamberini |
How to get away with cyberattacks: An argumentative approach to cyberattacks' legitimization by common users. |
CHI |
2022 |
DBLP DOI BibTeX RDF |
|
36 | Daphna Canetti, Michael L. Gross, Israel Waismel-Manor, Asaf Levanon, Hagit Cohen |
How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks. |
Cyberpsychology Behav. Soc. Netw. |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Phillip A. Laplante |
IT Predictions for 2008. |
IT Prof. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Matt Bishop, Deborah A. Frincke |
Information Assurance Education: A Work In Progress. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Eugene H. Spafford |
Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense. |
ISIPS |
2008 |
DBLP DOI BibTeX RDF |
security policy, vulnerabilities, patching, cyber security, security education |
22 | Demetres Antoniades, Panos Trimintzios, Michalis Polychronakis, Sven Ubik, Antonis Papadogiannakis, Vladimír Smotlacha |
LOBSTER: a European platform for passive network traffic monitoring. |
TRIDENTCOM |
2008 |
DBLP DOI BibTeX RDF |
netork monitoring, traffic classification, distributed monitoring |
22 | Linda Dailey Paulson |
News Briefs. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
optoelectronic fiber arrays, antiforensic attacks, hackers, storage technology |
22 | Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass |
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Maziar M. Nekovee |
Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Vipin Kumar |
Parallel and Distributed Computing for Cybersecurity. |
IEEE Distributed Syst. Online |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Michael Atighetchi, Partha P. Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall |
Adaptive Cyberdefense for Survival and Intrusion Tolerance. |
IEEE Internet Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jalal Heidary, Soroush Oshnoei, Meysam Gheisarnejad, Mohammad Reza Khalghani, Mohammad Hassan Khooban |
Shipboard Microgrid Frequency Control Based on Machine Learning Under Hybrid Cyberattacks. |
IEEE Trans. Ind. Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Bakht Sher Ali, Inam Ullah, Tamara Al Shloul, Izhar Ahmed Khan, Ijaz Khan, Yazeed Yasin Ghadi, Akmalbek Abdusalomov, Rashid Nasimov, Khmaies Ouahada, Habib Hamam |
ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networks. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli |
Intrusion detection system for cyberattacks in the Internet of Vehicles environment. |
Ad Hoc Networks |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ehsan Naderi, Arash Asrari |
A Deep Learning Framework to Identify Remedial Action Schemes Against False Data Injection Cyberattacks Targeting Smart Power Systems. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ehsan Naderi, Arash Asrari |
A Remedial Action Scheme To Mitigate Market Power Caused by Cyberattacks Targeting a Smart Distribution System. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Chenduo Ying, Ning Zheng 0001, Yiming Wu 0001, Ming Xu 0001, Wen-An Zhang 0001 |
Privacy-Preserving Adaptive Resilient Consensus for Multiagent Systems Under Cyberattacks. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yuxiang Hu, Xuewu Dai, Dongliang Cui, Tianyou Chai |
Detection and Identification of Cyberattacks and Physical Faults in Multi-Agent Systems: A Distributed Disturbance Decoupling Observer. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
18 | El-Nasser S. Youssef, Fabrice Labeau, Marthe Kassouf |
Adversarial Dynamic Load-Altering Cyberattacks Against Peak Shaving Using Residential Electric Water Heaters. |
IEEE Trans. Smart Grid |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara, Ahmad K. Al Hwaitat |
Unveiling the Dark Side of ChatGPT: Exploring Cyberattacks and Enhancing User Awareness. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Huda Lughbi, Mourad Mars, Khaled Hatem Almotairi |
A Novel NLP-Driven Dashboard for Interactive CyberAttacks Tweet Classification and Visualization. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ishaani Priyadarshini |
Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning. |
Big Data Cogn. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Shian Wang, Mingfeng Shang, Raphael E. Stern |
Cyberattacks on Adaptive Cruise Control Vehicles: An Analytical Characterization. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner |
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ömer Sen, Tarek Hassan, Andreas Ulbig, Martin Henze |
Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard Against Cyberattacks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Daolin Wen, Xiaowu Mu |
Secure Dual Asynchronous Tracking Control for Markov Jump Systems Under Hybrid Cyberattacks. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jinliang Liu, Enyu Gong, Lijuan Zha, Engang Tian, Xiangpeng Xie |
Interval Type-2 Fuzzy-Model-Based Filtering for Nonlinear Systems With Event-Triggering Weighted Try-Once-Discard Protocol and Cyberattacks. |
IEEE Trans. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Tao Wu 0012, Jinde Cao, Ju H. Park 0001, Kaibo Shi, Lianglin Xiong, Tingwen Huang |
Attack-Resilient Dynamic Event-Triggered Synchronization of Fuzzy Reaction-Diffusion Dynamic Networks With Multiple Cyberattacks. |
IEEE Trans. Fuzzy Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Timo Schenk, Adrian Lars Benjamin Iten, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller |
Studying the Robustness of Anti-Adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors. |
IEEE Trans. Dependable Secur. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Samrat Acharya, Hafiz Anwar Ullah Khan, Ramesh Karri, Yury Dvorkin |
MaDEVIoT: Cyberattacks on EV Charging Can Disrupt Power Grid Operation. |
ISGT |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner |
Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms. |
NSDI |
2024 |
DBLP BibTeX RDF |
|
18 | Serhii Danchuk, Olena Geidarova, Andrii Nicheporuk, Andrzej Kwiecien |
Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods. |
IntelITSIS |
2024 |
DBLP BibTeX RDF |
|
18 | Sergii Lysenko, Oleksandr Bokhonko, Volodymyr Vorobiyov, Piotr Gaj |
Method for identifying cyberattacks based on the use of social engineering over the phone. |
IntelITSIS |
2024 |
DBLP BibTeX RDF |
|
18 | Ethan Berei, M. Ajmal Khan, Ahmed Oun |
Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-Time Environment. |
CCNC |
2024 |
DBLP DOI BibTeX RDF |
|
18 | He Wen, Faisal Khan 0001, Salim Ahmed, Syed Imtiaz, Efstratios N. Pistikopoulos |
Risk assessment of human-automation conflict under cyberattacks in process systems. |
Comput. Chem. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sounghwan Hwang, Minhyun Cho, Sungsoo Kim, Inseok Hwang 0002 |
An LMI-Based Risk Assessment of Leader-Follower Multi-Agent System Under Stealthy Cyberattacks. |
IEEE Control. Syst. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kookyoung Han, Jin Hyuk Choi, Yunsik Choi, Gene Moo Lee, Andrew B. Whinston |
Security defense against long-term and stealthy cyberattacks. |
Decis. Support Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tianci Yang, Carlos Murguia, Dragan Nesic, Chen Lv |
A Robust CACC Scheme Against Cyberattacks via Multiple Vehicle-to-Vehicle Networks. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, Félix J. García Clemente |
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Juan Ignacio Iturbe Araya, Helena Rifà-Pous |
Anomaly-based cyberattacks detection for smart homes: A systematic literature review. |
Internet Things |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiao Cai, Kaibo Shi, Kun She 0001, Shouming Zhong, Yeng Chai Soh, Yue Yu |
Reliable Sampling Mechanism for Takagi-Sugeno Fuzzy NCSs Under Deception Cyberattacks for the Application of the Inverted Pendulum System. |
IEEE Trans. Reliab. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Liang Zheng 0003, Ji Bao, Zhenyu Mei |
Urban traffic signal control robust optimization against Risk-averse and Worst-case cyberattacks. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhen Liu, Changzhen Hu, Chun Shan, Zheheng Peng |
DEFIA: Evaluate defense effectiveness by fusing behavior information of cyberattacks. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ayat-Allah Bouramdane |
Cyberattacks in Smart Grids: Challenges and Solving the Multi-Criteria Decision-Making for Cybersecurity Options, Including Ones That Incorporate Artificial Intelligence, Using an Analytical Hierarchy Process. |
J. Cybersecur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sidra Abbas, Abdullah Al Hejaili, Gabriel Avelino R. Sampedro, Mideth B. Abisado, Ahmad S. Almadhor, Tariq Shahzad, Khmaies Ouahada |
A Novel Federated Edge Learning Approach for Detecting Cyberattacks in IoT Infrastructures. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sami El-Ferik, Muhammad Maaruf, Fouad M. Al-Sunni, Abdul-Wahid A. Saif, Mujahed Mohammad Al-Dhaifallah |
Reinforcement Learning-Based Control Strategy for Multi-Agent Systems Subjected to Actuator Cyberattacks During Affine Formation Maneuvers. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Laila M. Halman, Mohammed J. F. Alenazi |
MCAD: A Machine Learning Based Cyberattacks Detector in Software-Defined Networking (SDN) for Healthcare Systems. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kang Yan, Xuan Liu 0003, Yidan Lu, Zongchao Yu |
Thermostatically Controlled Loads in the Power System Under Cyberattacks. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mahmoud Elsisi, Marnel Altius, Shun-Feng Su, Chun-Lien Su |
Robust Kalman Filter for Position Estimation of Automated Guided Vehicles Under Cyberattacks. |
IEEE Trans. Instrum. Meas. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Bowen Hu, Chunjie Zhou, Yu-Chu Tian, Xin Du, Xiaoya Hu |
Attack Intention Oriented Dynamic Risk Propagation of Cyberattacks on Cyber-Physical Power Systems. |
IEEE Trans. Ind. Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas 0001, Sadaqat ur Rehman |
Cyberattacks and Security of Cloud Computing: A Complete Guideline. |
Symmetry |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kousei Sakata, Shintaro Fujita, Kenji Sawada, Hiroshi Iwasawa, Hiromichi Endoh, Noritaka Matsumoto |
Model verification of fallback control system under cyberattacks via UPPAAL. |
Adv. Robotics |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gurupraanesh Raman, Kangnian Liao, Jimmy Chih-Hsien Peng |
Improving AC Microgrid Stability Under Cyberattacks Through Timescale Separation. |
IEEE Trans. Circuits Syst. II Express Briefs |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ehsan Naderi, Arash Asrari |
Experimental Validation of a Remedial Action via Hardware-in-the-Loop System Against Cyberattacks Targeting a Lab-Scale PV/Wind Microgrid. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mark Karanfil, Dhiaa Elhak Rebbah, Mourad Debbabi, Marthe Kassouf, Mohsen Ghafouri, El-Nasser S. Youssef, Aiman Hanna |
Detection of Microgrid Cyberattacks Using Network and System Management. |
IEEE Trans. Smart Grid |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Raphael Fritz, Ping Zhang 0022 |
Detection and Localization of Stealthy Cyberattacks in Cyber-Physical Discrete Event Systems. |
IEEE Trans. Autom. Control. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xuhuan Xie, Yonggui Liu, Qinxue Li |
Neural network-based adaptive event-triggered control for cyber-physical systems under resource constraints and hybrid cyberattacks. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Na-Eun Park, Yu-Rim Lee, Soyoung Joo, So-Yeon Kim, Sohui Kim, Ju-Young Park, Seo-Yi Kim, Il-Gu Lee |
Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks. |
Comput. Electr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kang Yan, Xuan Liu 0003, Yidan Lu, Fanglu Qin |
A Cyber-Physical Power System Risk Assessment Model Against Cyberattacks. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Javad Khazaei, Faegheh Moazeni |
Neural Networks-Based Detection of Line Overflow Cyberattacks on AC State-Estimation of Smart Grids. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Haris M. Khalid, M. M. Qasaymeh, S. M. Muyeen, Mohamed Shawky El Moursi, Aoife M. Foley, Tha'er O. Sweidan, Sanjeevikumar Padmanaban |
WAMS Operations in Power Grids: A Track Fusion-Based Mixture Density Estimation-Driven Grid Resilient Approach Toward Cyberattacks. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Raffaele Romagnoli, Bruce H. Krogh, Dionisio de Niz, Anton D. Hristozov, Bruno Sinopoli |
Software Rejuvenation for Safe Operation of Cyber-Physical Systems in the Presence of Run-Time Cyberattacks. |
IEEE Trans. Control. Syst. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Adem Rosic |
Evaluating Machine Learning Classifier Approaches, and their Accuracy for the Detection of Cyberattacks on 5G IoT Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shreyanth S |
Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Samrat Acharya, Hafiz Anwar Ullah Khan, Ramesh Karri, Yury Dvorkin |
MaDEVIoT: Cyberattacks on EV Charging Can Disrupt Power Grid Operation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lennart Bader, Martin Serror, Olav Lamberts, Ömer Sen, Dennis van der Velde, Immanuel Hacker, Julian Filter, Elmar Padilla, Martin Henze |
Comprehensively Analyzing the Impact of Cyberattacks on Power Grids. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tianyi Li, Mingfeng Shang, Shian Wang, Raphael E. Stern |
Detecting stealthy cyberattacks on adaptive cruise control vehicles: A machine learning approach. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Samrat Acharya, Yury Dvorkin, Ramesh Karri |
Causative Cyberattacks on Online Learning-based Automated Demand Response Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kalinath Katuri, Ioannis Zografopoulos, Ha Thi Nguyen, Charalambos Konstantinou |
Experimental Impact Analysis of Cyberattacks in Power Systems using Digital Real-Time Testbeds. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Milad Farsi, Shuhao Bian, Nasser L. Azad, Xiaobing Shi, Andrew Walenstein |
An Efficient Resilient MPC Scheme via Constraint Tightening against Cyberattacks: Application to Vehicle Cruise Control. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lucas Augusto Meyer, Sergio Romero, Gabriele Bertoli, Tom Burt, Alex Weinert, Juan Lavista Ferres |
How effective is multifactor authentication at deterring cyberattacks? |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Scherb, Luc Bryan Heitz, Frank Grimberg, Hermann Grieder, Marcel Maurer |
A Serious Game for Simulating Cyberattacks to Teach Cybersecurity. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Marcelo Godoy Simões, Mohammed S. Elmusrati, Tero Vartiainen, Mike Mekkanen, Mazaher Karimi, Sayawu Diaba, Emmanuel Anti, Wilson Lopes |
Enhancing data security against cyberattacks in artificial intelligence based smartgrid systems with crypto agility. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tanushree Roy, Satadru Dey |
On Distinguishability of Anomalies as Physical Faults or Actuation Cyberattacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sergio Bernardez Molina, Pantaleone Nespoli, Félix Gómez Mármol |
Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller |
RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Bruno Paes Leao, Jagannadh Vempati, Siddharth Bhela, Tobias Ahlgrim, Daniel Arnold 0001 |
Augmented Digital Twin for Identification of Most Critical Cyberattacks in Industrial Systems. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ángel Luis Perales Gómez, Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán |
TemporalFED: Detecting Cyberattacks in Industrial Time-Series Data Using Decentralized Federated Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhe Wang, Tingkai Yan |
Federated Learning-based Vehicle Trajectory Prediction against Cyberattacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hanyuan Huang, Tao Li 0016, Yong Ding, Beibei Li 0002, Ao Liu |
An artificial immunity based intrusion detection system for unknown cyberattacks. |
Appl. Soft Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rehab Alanazi, Ahamed Aljuhani |
Anomaly Detection for Industrial Internet of Things Cyberattacks. |
Comput. Syst. Sci. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ishtiaq Ahmad Bajwa, Shabir Ahmad, Maqsood Mahmud, Farooq Ahmad Bajwa |
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector. |
Inf. Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kristel M. de Nobrega, Anne-Françoise Rutkowski, Pieter M. A. Ribbers |
The Impact of Cyberattacks on Small States. |
IEEE Softw. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mujib Jimoh |
Critiquing the U.S. characterization, attribution and retaliation laws and policies for cyberattacks. |
Comput. Law Secur. Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Oleg Illiashenko, Vyacheslav Kharchenko, Ievgen Babeshko, Herman Fesenko, Felicita Di Giandomenico |
Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Qiyi Xu, Linshuai Ge |
Dynamic event-triggered H∞ filtering for discrete-time singular networked control system subject to cyberattacks. |
Trans. Inst. Meas. Control |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zakwan AlArnaout, Nour Mostafa, Samer J. Alabed, Wael Hosny Fouad Aly, Ahmed Shdefat |
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ting Wang, Meiting Tu, Hao Lyu, Ye Li, Olivier Orfila, Guojian Zou, Dominique Gruyer |
Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jianan Zhang, Yuechao Ma, Lei Fu |
Adaptive memory event-triggered double asynchronous fault detection and security control for fuzzy semi-Markov jump systems under cyberattacks. |
Commun. Nonlinear Sci. Numer. Simul. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Shicheng Huo, Ya Zhang 0001, Frank L. Lewis, Changyin Sun |
Observer-Based Resilient Consensus Control for Heterogeneous Multiagent Systems Against Cyberattacks. |
IEEE Trans. Control. Netw. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yan Li 0036, Feiyu Song, Jinliang Liu, Xiangpeng Xie, Engang Tian |
Software-Defined Event-Triggering Control for Large-Scale Networked Systems Subject to Stochastic Cyberattacks. |
IEEE Trans. Control. Netw. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoyu Guo, Zhen Dong, Chenliang Wang, Zhengtao Ding |
Event-Based Resilient Distributed Estimation Under Multiple Heterogeneous Cyberattacks. |
IEEE Trans. Control. Netw. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Haoyuan Sun, Hong-Gui Han, Jian Sun 0003, Hong-Yan Yang, Jun-Fei Qiao 0001 |
Security Control of Sampled-Data T-S Fuzzy Systems Subject to Cyberattacks and Successive Packet Losses. |
IEEE Trans. Fuzzy Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tao Wu 0012, Sergey Gorbachev, Hak-Keung Lam, Ju H. Park 0001, Lianglin Xiong, Jinde Cao |
Adaptive Event-Triggered Space-Time Sampled-Data Synchronization for Fuzzy Coupled RDNNs Under Hybrid Random Cyberattacks. |
IEEE Trans. Fuzzy Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Olga Tushkanova, Dmitry Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko |
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. |
Algorithms |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lidan Liang, Jun Cheng 0004, Jinde Cao, Zheng-Guang Wu, Wu-Hua Chen |
Proportional-Integral Observer-Based State Estimation for Singularly Perturbed Complex Networks With Cyberattacks. |
IEEE Trans. Neural Networks Learn. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiaobin Gao, Feiqi Deng, Pengyu Zeng, Hongyang Zhang |
Adaptive Neural Event-Triggered Control of Networked Markov Jump Systems Under Hybrid Cyberattacks. |
IEEE Trans. Neural Networks Learn. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|