2024
DOI: 10.1109/tcyb.2023.3241179
|View full text |Cite
|
Sign up to set email alerts
|

Secure Adaptive Event-Triggered Control for Cyber–Physical Power Systems Under Denial-of-Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Finally, Monte Carlo simulations were used to verify the effectiveness of the design method. The wide introduction and usage of communication networks cause MJPSs to be increasingly exposed to cyber attacks [44]. If this occurs, it will lead to the performance of the entire system going down.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, Monte Carlo simulations were used to verify the effectiveness of the design method. The wide introduction and usage of communication networks cause MJPSs to be increasingly exposed to cyber attacks [44]. If this occurs, it will lead to the performance of the entire system going down.…”
Section: Discussionmentioning
confidence: 99%
“…According to the actual situation, to better describe cyberattacks, introduce a Bernoulli variable α j ( t ) , and use a nonlinear function f j ( x ( t ) ) to represent random cyberattacks. Motivated by Liu et al 39 and Wang et al, 40 the model of cyberattack is given as…”
Section: Preliminaries and Problem Formulationmentioning
confidence: 99%
“…Such FDI attacks can pollute the measurement signals and disrupt the control actions and thus lead to an unexpected steering action or following behavior of AVs. [3][4][5][6] When attackers fully understand the knowledge of system model parameters and operation data, they can tamper with sensor and actuator channels in a more covert way without detection, thus result in a more destructive FDI attacks. 7,8 Different from denial of service attacks which block communication channel through a large amount of transmissions, the well-designed FDI attacks are more hidden and targeted so that its can make a more serious threat to the reliable and stable operation of AVs.…”
Section: Introductionmentioning
confidence: 99%