Nguyen et al., 2023
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Shi et al. | Causality countermeasures for anomaly detection in cyber-physical systems | |
| Zhang et al. | Decentralized false-data injection attacks against state omniscience: Existence and security analysis | |
| Lo et al. | Distributed model-based nonlinear sensor fault diagnosis in wireless sensor networks | |
| Anwar et al. | Stealthy and blind false injection attacks on SCADA EMS in the presence of gross errors | |
| Lo et al. | Distributed reference-free fault detection method for autonomous wireless sensor networks | |
| Umsonst et al. | Anomaly detector metrics for sensor data attacks in control systems | |
| Basiri et al. | Kalman filter based secure state estimation and individual attacked sensor detection in cyber-physical systems | |
| US20190025435A1 (en) | Cyber-physical system defense | |
| Sun et al. | Statistical resolution limit analysis of two closely spaced signal sources using Rao test | |
| Huang et al. | False phasor data detection under time synchronization attacks: A neural network approach | |
| Nguyen et al. | The ability to detect the linear attack of WL-CUSUM and FMA algorithms | |
| Niu et al. | Optimal Fault Detection for Stochastic Linear Time-Varying Systems by $\chi^{2} $ Test | |
| Coluccia et al. | A tunable W-ABORT-like detector with improved detection vs rejection capabilities trade-off | |
| Bonczek et al. | Detection of hidden attacks on cyber-physical systems from serial magnitude and sign randomness inconsistencies | |
| Umsonst et al. | A game-theoretic approach for choosing a detector tuning under stealthy sensor data attacks | |
| Bishop et al. | On false-data attacks in robust multi-sensor-based estimation | |
| Honarvar et al. | A PCA-based algorithm for online false data injection and jamming attacks detection in cyber-physical systems | |
| Navazani et al. | Enhancing cyber attack detection in CPS using a semi-supervised approach to determine parameters for DBSCAN algorithm | |
| Kawano et al. | Revisit input observability: A new approach to attack detection and privacy preservation | |
| Masoumi et al. | SimSPRT-II: Monte Carlo simulation of sequential probability ratio test algorithms for optimal prognostic performance | |
| Meng et al. | Recursive filtering for complex networks against random deception attacks | |
| Qu et al. | K–L Divergence-Based Detection of Attacks on Remote Control: The Utilization of Local Information | |
| Marelli et al. | Statistical approach to detection of attacks for stochastic cyber-physical systems | |
| Langeroudi et al. | Integration of failure detector in bias filter for estimation of false data injection cyberattacks | |
| He et al. | Smart grid fault detection using locally optimum unknown or estimated direction hypothesis test |