CYBER SECURITY PROJECT
- Evaluation of Critical Node Groups in CyberPhysical Power Systems Based on Pinning Control Theory
- CyberPhysical Attack Conduction and Detection in Decentralized Power Systems
- Emerging Technologies for Next Generation Remote Health Care and Assisted Living
- Networked Security ObserverBased Reference Tracking Control of Stochastic Quadrotor UAV System Under CyberAttackTS Fuzzy Approach
- Optimizing Implementations of NonProfiled Deep LearningBased SideChannel Attacks
- Cyber Attack Detection and Isolation for a Quadrotor UAV With Modified Sliding Innovation Sequences
- Machine Learning Based MultiAgent System for Detecting and Neutralizing Unseen CyberAttacks in AGC and HVDC Systems
- Blockchain for Industry 50 Vision Opportunities Key Enablers and Future Directions
- Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
- Brain Tumor and Glioma Grade Classification Using Gaussian Convolutional Neural Network
- A Highly Discriminative Detector Against False Data Injection Attacks in AC State Estimation
- Combining LongTerm Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML
- RealTime Detection of False Readings in Smart Grid AMI Using Deep and Ensemble Learning
- CyberAttack on P2P Energy Transaction Between Connected Electric Vehicles A False Data Injection Detection Based Machine Learning Model
- Wireless Radar Sensor Networks Epidemiological Modeling and Optimization
- Cheating and Detection Method in Massively Multiplayer Online RolePlaying Game Systematic Literature Review
- A BiometricsBased Behavioral Trust Framework for Continuous Mobile Crowd Sensing Recruitment
- Asymptotically Guaranteed AntiJamming Spread Spectrum Random Access Without PreShared Secret *
- A Generalized Hold Based Countermeasure Against ZeroDynamics Attack With Application to DCDC Converter
- Helper Data Masking for Physically Unclonable FunctionBased Key Generation Algorithms
- A Comprehensive Analysis of Todays Malware and Its Distribution Network Common Adversary Strategies and Implications
- A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities
- A Comprehensive Review of Cybersecurity in InverterBased Smart Power System Amid the Boom of Renewable Energy
- DynamicLineRatingBased Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objective
- Information Dissemination With ServiceOriented Incentive Mechanism in Industrial Internet of Things

