Results (5)
Search Parameters:
Keyword: Cyber-attackOn the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor
In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…
Read MoreAn Improved Model to Analyze the Impact of Cyber-Attacks on Power Systems
In this paper, an improved model has been proposed for investigating the impact of cyber-attacks on power systems regarding frequency disturbances and voltage disruption while changing the load called ICAPS. The proposed ICAPS model is formulated by five different controllers, such as LFC, AGC, AGC-PID, AVR, and AVR-PID, implemented in two sets of the system…
Read MoreDetecting CTC Attack in IoMT Communications using Deep Learning Approach
Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…
Read MoreA Comparison of Cyber Security Reports for 2020 of Central European Countries
The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read More
