Wu, Ying Chen, Mou Li, Hongyi Chadli, Mohammed
Published in
IEEE transactions on cybernetics
This article studies the problem of memory event-triggered cooperative adaptive control of heterogeneous nonlinear multiagent systems (MASs) under denial-of-service (DoS) attacks based on the multiplayer mixed zero-sum (ZS) game strategy. First, a neural-network-based reinforcement learning scheme is structured to obtain the Nash equilibrium soluti...
Li, Xiaohang Chadli, Mohammed Tian, Zhaoyang Zhang, Weidong
This article develops a resilient-learning control strategy for a kind of cyber–physical system to mitigate the influence of a mixed-type of network attacks. Such an attack is composed of a false-data-injection attack and a replay attack, which can be represented comprehensively by using Markov jump signals. Note that the involved attacks are assum...
Wu, Ying Chen, Mou Li, Hongyi Chadli, Mohammed
Aiming at the six-rotor unmanned aerial vehicles subjected to false data injection attacks, an event-triggered-based distributed intelligent learning control strategy is proposed in this paper. The reinforcement learning algorithm which is designed based on neural networks is introduced to achieve intelligent optimal control. Under the actor-critic...
Abdellaoui, Sara Dumitrescu, Emil Escudero, Cédric Zamaï, Eric
International audience
Abdellaoui, Sara Dumitrescu, Emil Escudero, Cédric Zamaï, Eric
Monitored data collected from railway turnouts are vulnerable to cyberattacks: attackers may either conceal failures or trigger unnecessary maintenance actions. To address this issue, a cyberattack investigation method is proposed based on predictions made from the temporal evolution of the turnout behavior. These predictions are then compared to t...
Abdellaoui, Sara Dumitrescu, Emil Escudero, Cédric Zamaï, Eric
Monitored data collected from railway turnouts are vulnerable to cyberattacks: attackers may either conceal failures or trigger unnecessary maintenance actions. To address this issue, a cyberattack investigation method is proposed based on predictions made from the temporal evolution of the turnout behavior. These predictions are then compared to t...
Shombot, Emmanuel Song Dusserre, Gilles Bestak, Robert Ahmed, Nasir Baba
The imminent threat that phishing websites poses is a major concern for internet users worldwide. These fraudulent websites are crafted by cyber attackers to appear trustworthy and deceive vulnerable users into divulging confidential data like medical health records, credit card details, passwords, and Personal Identifiable information (PII). To ba...
Björnfoot, Linnéa Hansen, Julia
Bakgrund och problemformulering: Antalet cyberattacker har ökat exponentiellt de senaste åren(Taherdoost, 2022), och en stor utmaning är att de ständigt förändras (Kont, 2024; Williams, 2023;Yusif & Hafeez-Baig, 2021). Ett återkommande problem som gör att organisationer utsätts förattacker beror på otillräcklig kunskap och resurser för att hantera ...
Xiao, J. (author) Wang, L. (author) Qin, Z. (author) Bauer, P. (author)
Communication-based distributed secondary control is deemed necessary to restore the state of islanding AC microgrids to set points. As its limited global information, the microgrids become vulnerable to cyber-attacks, which by falsifying the communicating singles, like the angular frequency, can disturb the power dispatch in the microgrids or even...
Khemmar, Redouane El Houda Thabet, Rihab Lecrosnier, Louis Cabani, Adnane Jérémy, Fourre
State Estimation and Control of Autonomous Connected Vehicles: Advances and Challenges.