![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 44 matches
- 2020
- Fatemeh Akbarian, Amin Ramezani, Mohammad Taghi Hamidi Beheshti, Vahid Haghighat:
Advanced algorithm to detect stealthy cyber attacks on automatic generation control in smart grid. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 351-358 (2020) - B. M. Ruhul Amin
, Seyedfoad Taghizadeh
, Md. Shihanur Rahman, Md. Jahangir Hossain
, Vijay Varadharajan, Zhiyong Chen:
Cyber attacks in smart grid - dynamic impacts, analyses and recommendations. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 321-329 (2020) - Abdelrahman Ayad
, Hany E. Z. Farag, Amr M. Youssef, Ehab F. El-Saadany:
Cyber-physical attacks on power distribution systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 218-225 (2020) - Tamara Becejac
, Crystal Eppinger, Aditya Ashok
, Urmila Agrawal
, James O'Brien:
PRIME: a real-time cyber-physical systems testbed: from wide-area monitoring, protection, and control prototyping to operator training and beyond. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 186-195 (2020) - Gokhan Cetin
, M. Sami Fadali, Hao Xu:
Optimal resource allocation in networked control systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 168-175 (2020) - Lucas C. Cordeiro
, Eddie Batista de Lima Filho, Iury Valente de Bessa
:
Survey on automated symbolic verification and its application for synthesising cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 1-24 (2020) - Song Deng, Qingyuan Cai, Zi Zhang, Lechan Yang, Tinglei Huang, Changan Yuan:
Data filter function incremental mining based on feature selection in an active distribution network. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 301-309 (2020) - Fang Fang
, Songyuan Yu, Le Wei, Yajuan Liu, Jizhen Liu:
Data-driven control for combustion process of circulating fluidised bed boiler. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 39-48 (2020) - Farhad Farokhi
, Iman Shames, Karl Henrik Johansson
:
Private routing and ride-sharing using homomorphic encryption. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 311-320 (2020) - Xiaomeng Feng
, Qiuye Sun:
Stochastic games for power grid coordinated defence against coordinated attacks. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 292-300 (2020) - Fotis Foukalas
, Paul Pop
:
Distributed control plane for safe cooperative vehicular cyber physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 85-91 (2020) - Hugh Gowing, Paul Cuffe
:
Hijacking internet-connected devices to provoke harmful oscillations in an electrical network: a feasibility assessment. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 226-231 (2020) - Sonja Happ
, Stefan Dähling
, Antonello Monti
:
Scalable assessment method for agent-based control in cyber-physical distribution grids. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 283-291 (2020) - Md Musabbir Hossain
, Chen Peng:
Cyber-physical security for on-going smart grid initiatives: a survey. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 233-244 (2020) - Zhaohua Hu, JiaJing Huang:
Re-detection object tracking algorithm in the cyber physical system. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 253-262 (2020) - Tao Huang, Shengjun Xue, Yumei Hu, Yiran Shi, Wei Jin:
Data privacy-based coordinated placement method of workflows and data. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 342-350 (2020) - Jay Johnson
, Ifeoma Onunkwo, Patricia Cordeiro, Brian J. Wright, Nicholas Jacobs, Christine Lai:
Assessing DER network cybersecurity defences in a power-communication co-simulation environment. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 274-282 (2020) - Hadis Karimipour
, Henry Leung:
Relaxation-based anomaly detection in cyber-physical systems using ensemble kalman filter. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 49-58 (2020) - Shawkat Sabah Khairullah
, Carl R. Elks:
Self-repairing hardware architecture for safety-critical cyber-physical-systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 92-99 (2020) - Shane Lambert, Haitao Lu, Zane Shreve, Yi Zhan, A. K. M. Jahangir Alam Majumder
, Gokhan Sahin
:
Low-powered wearable motion detecting system using static electric fields. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 31-38 (2020) - Yuancheng Li, Wendan Huo, Rixuan Qiu, Jing Zeng
:
Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 110-118 (2020) - Deguang Li, Ruiling Zhang, Shijie Jia, Dong Liu, Yanling Jin, Junke Li:
Improved dynamic frequency-scaling approach for energy-saving-based radial basis function neural network. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 162-167 (2020) - Huei-Yung Lin
, Fang-Ning Yang:
Design and implementation of a CPS-based predictive maintenance and automated management platform. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 100-109 (2020) - Yongmei Liu, Songhuai Du, Wanxing Sheng
:
Classification and identification of electric shock current for safety operation in power distribution network. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 145-152 (2020) - Walter Lucia
, Amr M. Youssef:
Wyner wiretap-like encoding scheme for cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 359-365 (2020) - Md. Al Maruf
, Akramul Azim:
Extending resources for avoiding overloads of mixed-criticality tasks in cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 60-70 (2020) - John Mbuli
, Tarik Chargui
, Damien Trentesaux, Abdelghani Bekrar, Thierry Dailly:
Multi-agent system for the reactive fleet maintenance support planning of a fleet of mobile cyber-physical systems. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 376-387 (2020) - Ayaskanta Mishra
, Arun Kumar Ray:
IoT cloud-based cyber-physical system for efficient solid waste management in smart cities: a novel cost function based route optimisation technique for waste collection vehicles using dustbin sensors and real-time road traffic informatics. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 330-341 (2020) - Xirong Ning, Jin Jiang:
In the mind of an insider attacker on cyber-physical systems and how not being fooled. IET Cyper-Phys. Syst.: Theory & Appl. 5(2): 153-161 (2020) - Aradhna Patel
, Shubhi Purwar:
Event-triggered detection of cyberattacks on load frequency control. IET Cyper-Phys. Syst.: Theory & Appl. 5(3): 263-273 (2020)
skipping 14 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-01 04:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint