Evaluation of Critical Node Groups in CyberPhysical Power Systems Based on Pinning Control Theory
CyberPhysical Attack Conduction and Detection in Decentralized Power Systems
Emerging Technologies for Next Generation Remote Health Care and Assisted Living
Networked Security ObserverBased Reference Tracking Control of Stochastic Quadrotor UAV System Under CyberAttackTS Fuzzy Approach
Optimizing Implementations of NonProfiled Deep LearningBased SideChannel Attacks
Cyber Attack Detection and Isolation for a Quadrotor UAV With Modified Sliding Innovation Sequences
Machine Learning Based MultiAgent System for Detecting and Neutralizing Unseen CyberAttacks in AGC and HVDC Systems
Blockchain for Industry 50 Vision Opportunities Key Enablers and Future Directions
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Brain Tumor and Glioma Grade Classification Using Gaussian Convolutional Neural Network
A Highly Discriminative Detector Against False Data Injection Attacks in AC State Estimation
Combining LongTerm Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML
RealTime Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning
CyberAttack on P2P Energy Transaction Between Connected Electric Vehicles A False Data Injection Detection Based Machine Learning Model
Wireless Radar Sensor Networks Epidemiological Modeling and Optimization
Cheating and Detection Method in Massively Multiplayer Online RolePlaying Game Systematic Literature Review
A BiometricsBased Behavioral Trust Framework for Continuous Mobile Crowd Sensing Recruitment
Asymptotically Guaranteed AntiJamming Spread Spectrum Random Access Without PreShared Secret *
A Generalized Hold Based Countermeasure Against ZeroDynamics Attack With Application to DCDC Converter
Helper Data Masking for Physically Unclonable FunctionBased Key Generation Algorithms
A Comprehensive Analysis of Todays Malware and Its Distribution Network Common Adversary Strategies and Implications
A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
A Comprehensive Review of Cybersecurity in InverterBased Smart Power System Amid the Boom of Renewable Energy
DynamicLineRatingBased Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objective
Information Dissemination With ServiceOriented Incentive Mechanism in Industrial Internet of Things