×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
四川大学 [12]
上海电子信息职业技... [11]
自动化研究所 [9]
湖南大学 [9]
高能物理研究所 [7]
北京航空航天大学 [6]
更多...
内容类型
期刊论文 [63]
会议论文 [22]
学位论文 [1]
项目 [1]
发表日期
2024 [2]
2022 [2]
2021 [5]
2020 [4]
2019 [13]
2018 [28]
更多...
学科主题
engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共87条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Social Radars: Finding Targets in Cyberspace for Cybersecurity
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 2, 页码: 279-282
作者:
Lili Fan
;
Changxian Zeng
;
Yutong Wang
;
Jiaqi Ma
;
Fei-Yue Wang
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/01/23
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 851-865
作者:
Jing Zhou
;
Jun Shang
;
Tongwen Chen
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/03/18
Cyber-attacks
Kalman filtering
remote state estimation
unreliable transmission channels
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 3, 页码: 377-391
作者:
Jun Zhang
;
Lei Pan
;
Qing-Long Han
;
Chao Chen
;
Sheng Wen
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/03/09
Cyber-physical system
cybersecurity
deep learning
intrusion detection
pattern classification
Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks
期刊论文
Measurement and Control (United Kingdom), 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, YaJie
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/09/22
Actuators
Cyber Physical System
Cybersecurity
Delay control systems
Design
Embedded systems
Network security
Active fault
Active fault-tolerance
Active-passive attack-tolerance
Active/passive
Attack tolerances
Co-designs
Cybe-physical systems
Cyber-physical systems
Dual security control
False data injection attacks
Nonlinear cybe-physical system
Passive attacks
Security controls
A differential game view of antagonistic dynamics for cybersecurity
期刊论文
COMPUTER NETWORKS, 2021, 卷号: 200, 页码: 11
作者:
Wang, Shengling
;
Pu, Yu
;
Shi, Hongwei
;
Huang, Jianhui
;
Xiao, Yinhao
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/12/01
Antagonistic dynamics
Cybersecurity
Differential game
Saddle point
A Cyber-Secured Operation for Water-Energy Nexus
期刊论文
IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 卷号: 36, 期号: 4, 页码: 3105-3117
作者:
Zhao, Pengfei
;
Gu, Chenghong
;
Cao, Zhidong
;
Xie, Da
;
Teng, Fei
收藏
  |  
浏览/下载:74/0
  |  
提交时间:2021/08/15
Uncertainty
Optimization
Power systems
Load modeling
Water resources
Reliability
Economics
Distributionally robust optimization
false data injection attacks
integrated energy system
mitigation strategy
risk aversion
water-energy nexus
Using Event-Based Method to Estimate Cybersecurity Equilibrium
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 2, 页码: 455-467
作者:
Zhaofeng Liu
;
Ren Zheng
;
Wenlian Lu
;
Shouhuai Xu
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/04/09
Cybersecurity dynamics
cybersecurity equilibrium
event-based method
global state estimation
preventive and reactive cyber defense dynamics
Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research
期刊论文
APPLIED SCIENCES-BASEL, 2021, 卷号: 11, 期号: 12, 页码: 1-46
作者:
Wazzan, M (Wazzan, Majda)[ 1 ]
;
Algazzawi, D (Algazzawi, Daniyal)[ 2 ]
;
Bamasaq, O (Bamasaq, Omaima)[ 1 ]
;
Albeshri, A (Albeshri, Aiiad)[ 1 ]
;
Cheng, L (Cheng, Li)[ 3 ]
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2021/07/14
Internet of ThingsIoTbotnetdetectionsystematic literature reviewSLR
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
作者:
Wan M(万明)
;
Li JW(李嘉玮)
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/03/14
industrial cyber threats
industrial characteristics
vulnerabilities
security mechanisms and viewpoints
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
©版权所有 ©2017 CSpace - Powered by
CSpace