×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [4]
沈阳自动化研究所 [4]
兰州理工大学 [1]
地理科学与资源研究所 [1]
数学与系统科学研究院 [1]
内容类型
期刊论文 [10]
会议论文 [1]
发表日期
2021 [11]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
发表日期:2021
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Optimal defense resource allocation and geographically feasible hexagonal topology construction for power grid security
会议论文
Hangzhou, China, 2021 22-24 October
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/06/28
System Identification With Binary-Valued Observations Under Data Tampering Attacks
期刊论文
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 卷号: 66, 期号: 8, 页码: 3825-3832
作者:
Guo, Jin
;
Wang, Xuebin
;
Xue, Wenchao
;
Zhao, Yanlong
收藏
  |  
浏览/下载:79/0
  |  
提交时间:2021/10/26
Estimation
Sensor systems
Security
Communication networks
Automation
Production
Binary-valued observations
compensation-oriented defense scheme
data tampering attack
system identification
A Cyber-Secured Operation for Water-Energy Nexus
期刊论文
IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 卷号: 36, 期号: 4, 页码: 3105-3117
作者:
Zhao, Pengfei
;
Gu, Chenghong
;
Cao, Zhidong
;
Xie, Da
;
Teng, Fei
收藏
  |  
浏览/下载:73/0
  |  
提交时间:2021/08/15
Uncertainty
Optimization
Power systems
Load modeling
Water resources
Reliability
Economics
Distributionally robust optimization
false data injection attacks
integrated energy system
mitigation strategy
risk aversion
water-energy nexus
Integrated security control method for industrial cyber-physical system with attack and fault
期刊论文
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2021, 卷号: 55, 期号: 6, 页码: 1185-1198
作者:
Li, Wei
;
Zhang, Jian-Jun
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/02/17
Actuators
Computation theory
Cyber Physical System
Design
Embedded systems
Fault tolerance
Network security
Numerical methods
Communication resources
Communication schemes
Computing resource
Conservative technologies
Estimation results
False data injection
Integrated security control
Lyapunov stability theory
Vulnerability of Submarine Cable Network of Mainland China: Comparison of Vulnerability between before and after Construction of Trans-Arctic Cable System
期刊论文
COMPLEXITY, 2021, 卷号: 2021, 页码: 14
作者:
Xie, Yongshun
;
Wang, Chengjin
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/04/25
A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 2, 页码: 273-302
作者:
Xing Yang
;
Lei Shu
;
Jianing Chen
;
Mohamed Amine Ferrag
;
Jun Wu
收藏
  |  
浏览/下载:46/0
  |  
提交时间:2021/04/09
Agricultural artificial intelligence
agricultural automation
agricultural Internet of Things
security
smart agriculture
Physical Safety and Cyber Security Analysis of Multi-Agent Systems: A Survey of Recent Advances
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 2, 页码: 319-333
作者:
Dan Zhang
;
Gang Feng
;
Yang Shi
;
Dipti Srinivasan
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/04/09
Consensus
deception attack
deny-of-service (DoS) attack
fault detection
fault estimation
fault tolerant control
multi-agent systems
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
作者:
Wan M(万明)
;
Li JW(李嘉玮)
;
Liu Y(刘颖)
;
Zhao JM(赵剑明)
;
Wang, Jiushuang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/03/14
industrial cyber threats
industrial characteristics
vulnerabilities
security mechanisms and viewpoints
A Deviation-based Detection Method against False Data Injection Attacks in Smart Grid
期刊论文
IEEE Access, 2021, 卷号: 9, 页码: 15499-15509
作者:
Pei C(裴超)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/01/30
State estimation
false data injection attacks
smart grid
cyber security
Kalman filter
cyber physical system
Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 卷号: 8, 期号: 2, 页码: 971-983
作者:
Pei C(裴超)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/08/03
Adversarial attack and defense
artificial intelligence security
attack detection
canonical variate analysis
cyber security
false data injection attack (FDIA)
smart grid
state estimation
©版权所有 ©2017 CSpace - Powered by
CSpace