期刊文献+
共找到191篇文章
< 1 2 10 >
每页显示 20 50 100
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
1
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
下载PDF
A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs
2
作者 Pavlo Mykytyn Marcin Brzozowski +1 位作者 Zoya Dyka Peter Langendoerfer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1019-1050,共32页
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th... The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature. 展开更多
关键词 Unmanned aerial vehicle unmanned aerial system cyber security and privacy drone swarm security vulnerabilities cyber-threats cyber-attacks plausibility check
下载PDF
Set-theoretic detection of data corruption attacks on cyber physical power systems 被引量:4
3
作者 Efstathios KONTOURAS Anthony TZES Leonidas DRITSAS 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2018年第5期872-886,共15页
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control area... This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand. 展开更多
关键词 Power systems LOAD frequency control cyber-attacks Set-theoretic methods
原文传递
Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks 被引量:1
4
作者 Asad Raza Shahzad Memon +1 位作者 Muhammad Ali Nizamani Mahmood Hussain Shah 《Intelligent Automation & Soft Computing》 2024年第3期545-566,共22页
Smart Industrial environments use the Industrial Internet of Things(IIoT)for their routine operations and transform their industrial operations with intelligent and driven approaches.However,IIoT devices are vulnerabl... Smart Industrial environments use the Industrial Internet of Things(IIoT)for their routine operations and transform their industrial operations with intelligent and driven approaches.However,IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet.Traditional signature-based IDS are effective in detecting known attacks,but they are unable to detect unknown emerging attacks.Therefore,there is the need for an IDS which can learn from data and detect new threats.Ensemble Machine Learning(ML)and individual Deep Learning(DL)based IDS have been developed,and these individual models achieved low accuracy;however,their performance can be improved with the ensemble stacking technique.In this paper,we have proposed a Deep Stacked Neural Network(DSNN)based IDS,which consists of two stacked Convolutional Neural Network(CNN)models as base learners and Extreme Gradient Boosting(XGB)as the meta learner.The proposed DSNN model was trained and evaluated with the next-generation dataset,TON_IoT.Several pre-processing techniques were applied to prepare a dataset for the model,including ensemble feature selection and the SMOTE technique.Accuracy,precision,recall,F1-score,and false positive rates were used to evaluate the performance of the proposed ensemble model.Our experimental results showed that the accuracy for binary classification is 99.61%,which is better than in the baseline individual DL and ML models.In addition,the model proposed for IDS has been compared with similar models.The proposed DSNN achieved better performance metrics than the other models.The proposed DSNN model will be used to develop enhanced IDS for threat mitigation in smart industrial environments. 展开更多
关键词 Industrial internet of things smart industrial environment cyber-attacks convolutional neural network ensemble learning
下载PDF
基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计 被引量:5
5
作者 刘金良 顾媛媛 费树岷 《中国科学:信息科学》 CSCD 北大核心 2018年第10期1348-1363,共16页
本文研究了基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计问题.为了节约网络传输带宽资源,本文引入事件触发机制降低负荷频率控制电力系统测量输出的传输量.考虑网络环境下随机网络攻击的影响,建立基于事件触发和网络攻... 本文研究了基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波器设计问题.为了节约网络传输带宽资源,本文引入事件触发机制降低负荷频率控制电力系统测量输出的传输量.考虑网络环境下随机网络攻击的影响,建立基于事件触发和网络攻击的负荷频率控制电力系统H_∞滤波误差模型.基于此滤波误差模型,利用Lyapunov稳定性理论和线性矩阵不等式技术分别给出了负荷频率控制电力系统均方渐近稳定的充分性条件和H_∞滤波器设计方法,最后通过仿真算例验证本文所提H_∞滤波器设计方法的有效性. 展开更多
关键词 电力系统 事件触发 网络攻击 H∞滤波 网络化控制系统
原文传递
网络攻击下产品与供应链协同演进系统数据驱动变更控制设计 被引量:4
6
作者 李庆奎 高雪峰 +2 位作者 彭晨 张蕴隆 易军凯 《中国科学:信息科学》 CSCD 北大核心 2023年第2期325-343,共19页
产品与供应链协同演进系统(product and supply chain synchronous evolution system,PSCSE)是一类复杂的分布式信息物理系统(cyber-physical system,CPS),含有大量的未建模动态与不确定性.剧烈的需求波动及突发的网络事件,使系统结构... 产品与供应链协同演进系统(product and supply chain synchronous evolution system,PSCSE)是一类复杂的分布式信息物理系统(cyber-physical system,CPS),含有大量的未建模动态与不确定性.剧烈的需求波动及突发的网络事件,使系统结构参数极易发生变化.产品设计变更是维持PSCSES稳定、满足用户需求及保证经济效益的重要手段.本文研究基于分布式CPS的PSCSES在受到DoS攻击下的应急变更控制问题.首先,针对PSCSES在网络攻击下数据包丢失问题,利用每条子链的历史数据设计基于循环神经网络(recurrent neural network,RNN)的预测器以弥补因网络攻击造成的库存数据丢失;其次,利用博弈论思想将H∞一致性控制问题转化为多人零和图博弈问题,提出一种应急变更补偿机制;进而基于Q-learning的策略迭代技术设计了模型未知的控制器求解算法,实现了系统的库存状态H∞一致性.最后,仿真实验验证了所提方法的有效性. 展开更多
关键词 网络攻击 数据驱动 供应链 变更控制设计 多智能体
原文传递
基于模糊协同交互型观测器的柔性关节机械臂信息物理融合系统的安全控制
7
作者 黄鑫 畅晨旭 +1 位作者 肖舒怡 李小杭 《自动化学报》 EI CAS CSCD 北大核心 2024年第12期2487-2498,共12页
本文研究了柔性关节机械臂信息物理融合系统(Cyber-physical systems,CPS)在传感器测量和执行器输入受到网络攻击时的安全控制问题.首先,用T-S模糊模型描述柔性关节机械臂CPS,描述后的模型可能存在不可测量或可测量但受传感器攻击影响... 本文研究了柔性关节机械臂信息物理融合系统(Cyber-physical systems,CPS)在传感器测量和执行器输入受到网络攻击时的安全控制问题.首先,用T-S模糊模型描述柔性关节机械臂CPS,描述后的模型可能存在不可测量或可测量但受传感器攻击影响的前件变量(Premise variables,PVs),这些PVs直接用于构建模糊控制器会影响控制器的控制效果.因此,提出一类模糊协同交互观测器来构造新的、可靠的、可利用的PVs.同时,该观测器能够与包含攻击估计误差(Attack estimation error,AEE)信息的辅助系统进行协同交互.与已有结果相比,所提出的观测器通过协同交互结构,充分利用了AEE信息,提高了攻击信号的重构精度.在此基础上,提出了一种具有攻击补偿结构的安全控制方案,从而消除了传感器和执行器攻击对柔性关节机械臂CPS性能的影响.仿真结果验证了所提出的安全控制方案的有效性. 展开更多
关键词 柔性关节机械臂 信息物理融合系统 网络攻击 T-S模糊模型 协同交互型观测器 安全控制
下载PDF
Non-Deterministic Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification Attacks
8
作者 Dan You Shouguang Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期240-248,共9页
In this paper, we study the supervisory control problem of discrete event systems assuming that cyber-attacks might occur. In particular, we focus on the problem of liveness enforcement and consider a sensor-reading m... In this paper, we study the supervisory control problem of discrete event systems assuming that cyber-attacks might occur. In particular, we focus on the problem of liveness enforcement and consider a sensor-reading modification attack(SM-attack) that may disguise the occurrence of an event as that of another event by intruding sensor communication channels. To solve the problem, we introduce non-deterministic supervisors in the paper, which associate to every observed sequence a set of possible control actions offline and choose a control action from the set randomly online to control the system. Specifically, given a bounded Petri net(PN) as the reference formalism and an SMattack, an algorithm that synthesizes a liveness-enforcing nondeterministic supervisor tolerant to the SM-attack is proposed for the first time. 展开更多
关键词 cyber-attacks cyber-physical system(CPS) LIVENESS non-deterministic supervisors Petri net(PN)
下载PDF
网络制裁的国际法分析与应对
9
作者 高琳 《北京政法职业学院学报》 2024年第4期23-29,共7页
随着网络攻击和恶意网络活动的增加,网络制裁成为国际社会应对网络威胁的重要手段之一。然而,网络制裁在国际法领域面临诸多挑战。文章梳理了网络制裁的产生以及主要国家的网络制裁实践,分析了网络制裁在动机明确性与归因困难、手段多... 随着网络攻击和恶意网络活动的增加,网络制裁成为国际社会应对网络威胁的重要手段之一。然而,网络制裁在国际法领域面临诸多挑战。文章梳理了网络制裁的产生以及主要国家的网络制裁实践,分析了网络制裁在动机明确性与归因困难、手段多样性与武力冲突风险、合法性与人权问题等方面的矛盾。针对网络制裁对中国的影响,文章提出了完善国内法律体系、加强国际合作等应对策略,旨在为中国有效应对网络制裁提供理论和实践依据。 展开更多
关键词 网络制裁 网络攻击 国际法 归因
下载PDF
Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks
10
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期530-547,共18页
The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vu... The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vulnerabilities in the nation’s infrastructure have become more pronounced. Cyber-attacks on critical infrastructure, such as power grids, transportation networks, and financial systems, pose a significant risk to national security and public safety. These attacks can disrupt essential services, cause economic losses, and potentially have severe consequences for the well-being of individuals and communities. The rise of cyber-terrorism is also a concern. Cyber-terrorists can exploit vulnerabilities in cyberspace to compromise infrastructure systems, causing chaos and panic among the population. The potential for destructive attacks on critical infrastructure is a pressing issue requiring constant attention and proactive measures. 展开更多
关键词 Critical Infrastructure cyber-attacks cyberSECURITY cyberSPACE cyber-Terrorism
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
11
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 cyber-attacks cyberCRIME cyberSECURITY cyber Threats Domestic Terrorism
下载PDF
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
12
作者 Wufei Wu Javad Hassannataj Joloudari +8 位作者 Senthil Kumar Jagatheesaperumal Kandala N.V.P.SRajesh Silvia Gaftandzhieva Sadiq Hussain Rahimullah Rabih Najibullah Haqjoo Mobeen Nazar Hamed Vahdat-Nejad Rositsa Doneva 《Computers, Materials & Continua》 SCIE EI 2024年第8期2785-2813,共29页
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide... The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks. 展开更多
关键词 cyber-attacks internet of things internet of vehicles intrusion detection system
下载PDF
Cybersecurity Landscape on Remote State Estimation:A Comprehensive Review
13
作者 Jing Zhou Jun Shang Tongwen Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期851-865,共15页
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state esti... Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state estimation(RSE)is an indispensable functional module of CPSs.Recently,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance degradation.This paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against RSE.Firstly,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of RSE.Secondly,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from adversaries.Thirdly,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'perspectives.Finally,several challenges and open problems are presented to inspire further exploration and future research in this field. 展开更多
关键词 cyber-attacks Kalman filtering remote state estimation unreliable transmission channels
下载PDF
山东半岛沿岸海域航行中补给船抗干扰同步控制
14
作者 韩国杰 刘志朋 +2 位作者 巩庆涛 徐丙莲 胡鑫 《鲁东大学学报(自然科学版)》 2024年第2期97-104,共8页
本文研究了山东半岛沿岸海域航行中补给船同步控制问题,并解决网络攻击和干扰补偿引起的增益时变问题。首先,构造了干扰观测器以提供海洋中的时变干扰估计值,构造了自适应律实时更新未知控制参数;其次,通过将干扰观测器与矢量反步技术... 本文研究了山东半岛沿岸海域航行中补给船同步控制问题,并解决网络攻击和干扰补偿引起的增益时变问题。首先,构造了干扰观测器以提供海洋中的时变干扰估计值,构造了自适应律实时更新未知控制参数;其次,通过将干扰观测器与矢量反步技术相结合,设计一种用于同步的抗干扰跟踪控制器;最后,在1∶70比例的补给船模型上进行了仿真模拟。结果表明:抗干扰同步跟踪控制器能够实现补给船与被补给船的同步航行,并保证闭环同步跟踪控制系统中的所有信号全局一致最终有界。 展开更多
关键词 航行补给 同步控制 干扰观测器 网络攻击 矢量反步法
下载PDF
基于代理梯度深度强化学习的电力系统网络攻击事后安全控制策略
15
作者 朱继忠 黄林莹 陈一熙 《电网技术》 EI CSCD 北大核心 2024年第10期4041-4049,I0032,I0033,I0031,共12页
为解决电力系统在遭受网络攻击后修复过程中的系统安全稳定问题,同时应对环境中存在的不确定性因素,该文提出了一种基于代理梯度深度强化学习的电力系统网络攻击事后安全控制策略。首先,建立了针对信息系统数据与信息系统功能的网络攻... 为解决电力系统在遭受网络攻击后修复过程中的系统安全稳定问题,同时应对环境中存在的不确定性因素,该文提出了一种基于代理梯度深度强化学习的电力系统网络攻击事后安全控制策略。首先,建立了针对信息系统数据与信息系统功能的网络攻击模型,构建了攻击后系统的安全控制策略模型,并分析了网络攻击下系统事件演化过程;接着,在深度强化学习的框架下,定义了安全控制策略的马尔科夫决策过程;而后,设计了一种基于代理梯度的深度强化学习算法,通过参数扰动生成智能体种群,将智能体种群中对应各组扰动的适应度加权平均作为代理梯度;最后,采用IEEE-39节点系统对该文所提方法的有效性和优越性进行验证。 展开更多
关键词 网络攻击 深度强化学习 代理梯度 安全控制 不确定性
下载PDF
基于多服务器互相验证的用户身份认证协议 被引量:4
16
作者 牛雨 《计算机仿真》 CSCD 北大核心 2016年第2期350-354,共5页
为了提高多服务器系统中用户身份验证的安全性,并提升验证效率,提出一种基于多服务器互相验证的用户身份认证协议。协议在用户注册阶段采用椭圆曲线理论和散列函数来加强用户密码的安全性。在验证信息提取阶段,根据用户信息的不同有效期... 为了提高多服务器系统中用户身份验证的安全性,并提升验证效率,提出一种基于多服务器互相验证的用户身份认证协议。协议在用户注册阶段采用椭圆曲线理论和散列函数来加强用户密码的安全性。在验证信息提取阶段,根据用户信息的不同有效期,提出了两种方案来执行服务器与用户私有密匙的验证机制。最后通过用户与服务器之间会话密钥的互相验证来确认访问权限。通过协议安全性及性能分析表明,上述协议相比基于椭圆曲线密码体制的用户认证协议和非交互的双通道连续流的身份验证协议,在防御网络重放攻击等黑客攻击上具有更高的安全性,且算法的身份验证效率分别提高了29.7%、34.2%。 展开更多
关键词 用户认证协议 多服务器互相验证体系 密钥协商 网络攻击
下载PDF
A Joint Estimation Method of SOC and SOH for Lithium-ion Battery Considering Cyber-Attacks Based on GA-BP
17
作者 Tianqing Yuan Na Li +1 位作者 Hao Sun Sen Tan 《Computers, Materials & Continua》 SCIE EI 2024年第9期4497-4512,共16页
To improve the estimation accuracy of state of charge(SOC)and state of health(SOH)for lithium-ion batteries,in this paper,a joint estimation method of SOC and SOH at charging cut-off voltage based on genetic algorithm... To improve the estimation accuracy of state of charge(SOC)and state of health(SOH)for lithium-ion batteries,in this paper,a joint estimation method of SOC and SOH at charging cut-off voltage based on genetic algorithm(GA)combined with back propagation(BP)neural network is proposed,the research addresses the issue of data manipulation resulting fromcyber-attacks.Firstly,anomalous data stemming fromcyber-attacks are identified and eliminated using the isolated forest algorithm,followed by data restoration.Secondly,the incremental capacity(IC)curve is derived fromthe restored data using theKalman filtering algorithm,with the peak of the ICcurve(ICP)and its corresponding voltage serving as the health factor(HF).Thirdly,the GA-BP neural network is applied to map the relationship between HF,constant current charging time,and SOH,facilitating the estimation of SOH based on HF.Finally,SOC estimation at the charging cut-off voltage is calculated by inputting the SOH estimation value into the trained model to determine the constant current charging time,and by updating the maximum available capacity.Experiments show that the root mean squared error of the joint estimation results does not exceed 1%,which proves that the proposed method can estimate the SOC and SOH accurately and stably even in the presence of false data injection attacks. 展开更多
关键词 Lithium-ion batteries state of charge state of health cyber-attacks genetic algorithm back propagation neural network
下载PDF
网络攻击下的Markov跳变系统有限时间控制 被引量:4
18
作者 谭天 高金凤 +1 位作者 王锦霞 汪家琪 《信息安全研究》 2021年第2期145-154,共10页
网络攻击多样化、分布式和高频率的特点,对国民经济和社会发展带来巨大威胁.在工业控制领域,针对网络控制系统安全的研究愈发重要.主要考虑了一类基于混杂驱动机制与双通道量化的Markov跳变系统,研究了系统在网络攻击下的有限时间稳定... 网络攻击多样化、分布式和高频率的特点,对国民经济和社会发展带来巨大威胁.在工业控制领域,针对网络控制系统安全的研究愈发重要.主要考虑了一类基于混杂驱动机制与双通道量化的Markov跳变系统,研究了系统在网络攻击下的有限时间稳定和H_∞性能.首先,建立输出反馈的Markov跳变系统模型,设计了输出反馈控制器.为减少控制系统中公共网络带宽负担,降低无效信号的传输率,在传统事件触发机制基础上,引入混杂驱动机制和双通道对数量化器,平衡系统性能和通信数据传输率.然后,引入网络攻击模型,增强Markov跳变系统对外部攻击的抵抗性.构造Lyapunov-Krasovskii泛函,利用线性矩阵不等式给出系统在有限时间的稳定性判据和H_∞性能指标,最后通过2个仿真实例证明所提出的定理的有效性. 展开更多
关键词 混杂驱动机制 量化 MARKOV跳变系统 网络攻击 有限时间
下载PDF
Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks 被引量:2
19
作者 Yingjun Wu Hao Xu Ming Ni 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第4期750-759,共10页
With the widespread use of communication and information technology,power system has been evolving into cyber-physical power system(CPPS)and becoming more vulnerable to cyber-attacks.Therefore,it is necessary to enhan... With the widespread use of communication and information technology,power system has been evolving into cyber-physical power system(CPPS)and becoming more vulnerable to cyber-attacks.Therefore,it is necessary to enhance the ability of the communication and information system in CPPS to defend against cyber-attacks.This paper proposes a method to enhance the survivability of the communication and information system in CPPS.Firstly,the communication and information system for critical business of power system is decomposed into certain types of atomic services,and then the survivability evaluation indexes and their corresponding calculation method for the communication and information system are proposed.Secondly,considering the efficacy and cost defensive resources,a defensive resource allocation model is proposed to maximize the survivability of communication and information system in CPPS.Then,a modified genetic algorithm is adopted to solve the proposed model.Finally,the simulation results of CPPS for an IEEE 30-node system verify the proposed method. 展开更多
关键词 cyber-physical power system(CPPS) cyber-attacks survivability evaluation communication and information system defensive resource
原文传递
Hybrid-triggered consensus for multi-agent systems with time-delays,uncertain switching topologies, and stochastic cyber-attacks 被引量:1
20
作者 Xia Chen Li-Yuan Yin +1 位作者 Yong-Tai Liu Hao Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第9期131-144,共14页
We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoul... We propose a new approach to discuss the consensus problem of multi-agent systems with time-varying delayed control inputs, switching topologies, and stochastic cyber-attacks under hybrid-triggered mechanism.A Bernoulli variable is used to describe the hybrid-triggered scheme, which is introduced to alleviate the burden of the network.The mathematical model of the closed-loop control system is established by taking the influences of time-varying delayed control inputs,switching topologies, and stochastic cyber-attacks into account under the hybrid-triggered scheme.A theorem as the main result is given to make the system consistent based on the theory of Lyapunov stability and linear matrix inequality.Markov jumps with uncertain rates of transitions are applied to describe the switch of topologies.Finally, a simulation example demonstrates the feasibility of the theory in this paper. 展开更多
关键词 hybrid-triggered CONSENSUS multi-agent system time-delay and cyber-attacks switching TOPOLOGIES
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部