Academic literature on the topic 'Synchronized attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Synchronized attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Synchronized attack"

1

Yamuna Bee, Mrs J., E. Naveena, Reshma Elizabeth Thomas, Arathi Chandran, Siva Subramania Raja M, and A. Akhilesh. "Intrusion Detection on Apache Spark Platform in Big data and Machine Learning Techniques." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 22, 2021): 1257–66. http://dx.doi.org/10.51201/jusst/21/06427.

Full text
Abstract:
With the rising cyber-physical power systems and emerging danger of cyber-attacks, the traditional power services are faced with higher risks of being compromised, as vulnerabilities in cyber communications can be broken to cause material damage. Therefore, adjustment needs to be made in the present control scheme plan methods to moderate the impact of possible attacks on service quality. This paper, focuses on the service of synchronized source-load contribution in main frequency regulation, a weakness study is performed with model the attack intrusion process, and the risk review of the service is made by further model the attack impacts on the service’s bodily things. On that basis, the customary synchronized reserve allotment optimization model is adapted and the allocation scheme is correct according to the cyber-attack impact. The proposed alteration methods are validating through a case study, showing efficiency in defensive alongside the cyber-attack impacts.
APA, Harvard, Vancouver, ISO, and other styles
2

Manaseer, Saher, Ahmad K. Al Hwaitat, and Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment." Modern Applied Science 12, no. 10 (September 9, 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Full text
Abstract:
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.

Full text
Abstract:
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
4

O'Connell, Michael, and Aaron Bernard. "A Serious Cause of Panic Attack." Case Reports in Emergency Medicine 2012 (2012): 1–3. http://dx.doi.org/10.1155/2012/393275.

Full text
Abstract:
We report on a case of a patient with atrial fibrillation in the setting of Wolff-Parkinson-White syndrome. The patient underwent synchronized electrical cardioversion, typically considered safe and effective, which resulted in a dangerous complication for the patient (degeneration into ventricular fibrillation). Discussion of common rhythm disturbances in WPW and management strategies are reviewed.
APA, Harvard, Vancouver, ISO, and other styles
5

Butcher, Thomas M. "A ‘synchronized attack’: On Raphael Lemkin's holistic conception of genocide." Journal of Genocide Research 15, no. 3 (September 2013): 253–71. http://dx.doi.org/10.1080/14623528.2013.821221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lisova, Elena, Marina Gutiérrez, Wilfried Steiner, Elisabeth Uhlemann, Johan Åkerberg, Radu Dobrin, and Mats Björkman. "Protecting Clock Synchronization: Adversary Detection through Network Monitoring." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/6297476.

Full text
Abstract:
Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM) attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP) poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.
APA, Harvard, Vancouver, ISO, and other styles
7

Manaseer, Saher, and Ahmad K. Al Hwaitat. "Centralized Web Application Firewall Security System." Modern Applied Science 12, no. 10 (September 29, 2018): 164. http://dx.doi.org/10.5539/mas.v12n10p164.

Full text
Abstract:
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at the same time , using an centralized command and control system, the attacked client then sends the information to a centralized command and control server which will distribute the attack information to all of the integrated clients connected to it. The distributed information contains all of the attack information including the type of attack, the IP address of the attacker, and the time of attack. The process of receiving the attacker's information and distributing it through the centralized web firewall is done automatically and immediately at the time of the attack. And all of the receiving clients will take actions against the threat depending on the distributed information such as banning the IP address of the attacker. The main process aims to protect multiple clients from any possible attack from the same attacker or the same type of attack. The system has been implemented to protect a real web application. Experiments showed that the attacks has been successfully prevented on multiple hosts at the time. This paper came to provide a centralized web firewall system that connect different web firewalls in order to detect and prevent different types of web attacks and work as a fully integrated system with the different clients.
APA, Harvard, Vancouver, ISO, and other styles
8

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Full text
Abstract:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
10

Ullah, Matti, Warda Aoudjeghout, Cynthia Pimpie, Marc Pocard, and Massoud Mirshahi. "Mitosis in Cancer Cell Increases Immune Resistance via High Expression of HLA-G and PD-L1." Cancers 12, no. 9 (September 18, 2020): 2661. http://dx.doi.org/10.3390/cancers12092661.

Full text
Abstract:
Cancer is a result of “aggressive” division and uncontrolled proliferation of the abnormal cells that survive attack by immune cells. We investigated the expression of HLA-G and PD-L1 with the different stages of cancer cell division along with their role in the interaction of immune cells in vitro. Ovarian cancer (OVCAR-3) and chronic myeloid leukemia cell line (K-562) are used for this study. The correlation of protein expression with percentage of cells in each phase (G1, S and G2 phase) was evaluated through FACS. Cells were synchronized in G1, G2 and mitotic phase to evaluate gene (RT-qPCR) and protein expression (FACS). Real-time immune cell attack (RTICA) analysis with PBMCs (peripheral blood mono-nuclear cells) and cancer cells were performed. We found that cells expressing higher levels of HLA-G and PD-L1 are mainly in G2 phase and those expressing lower levels are mainly in G1 phase. Evidently, the higher expression of the two proteins was observed when synchronized in mitotic phase as compared to low expression when synchronized in G1 phase. RTICA analysis showed the presence of HLA-G delayed the lysis of the cells. In conclusion, the cancer cell can escape from immune cells in division stage that suggests the impact of mitosis index for cancer immunotherapy.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Synchronized attack"

1

Gomes, Lara Elena. "Comparação entre forças propulsivas efetivas calculadas e medida durante um palmateio de sustentação." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2010. http://hdl.handle.net/10183/27677.

Full text
Abstract:
A força propulsiva gerada durante o palmateio é resultado do somatório das forças de arrasto e de sustentação, sendo que a componente que atua na direção do movimento desejado é igual à força propulsiva efetiva. Essas forças podem ser estimadas a partir de equações hidrodinâmicas, porém essas equações não consideram todos os mecanismos que contribuem para a propulsão. Dessa forma, o objetivo geral do presente estudo foi comparar a força propulsiva efetiva calculada a partir das equações hidrodinâmicas e a força propulsiva efetiva medida durante o palmateio de sustentação (na posição vertical, de cabeça para cima) em cada fase do palmateio. Para isso, uma praticante de nado sincronizado realizou palmateio na posição vertical de cabeça para cima durante 15 segundos, enquanto que dados cinemáticos e cinéticos foram obtidos por viodeogrametria 3D e dinamometria respectivamente. A análise gráfica de Bland e Altman foi usada para comparar as forças propulsivas efetivas medida e calculada durante o palmateio. As forças propulsivas efetivas calculada e medida foram diferentes, sendo a medida maior que a calculada. Ainda, os resultados indicaram que o palmateio executado não foi simétrico, isto é, a orientação e a força propulsiva entre a mão direita e a esquerda foram diferentes. Portanto, o achado do presente trabalho destaca a importância de mecanismos instáveis para a propulsão durante o palmateio, já que as forças estimadas por meio das equações hidrodinâmicas apresentaram resultados inferiores, sendo isso observado ao longo de todo o palmateio.
Propulsive force generated during sculling motion results from drag and lift propulsive forces, and the component acting in the direction of motion is the effective propulsive force. These forces may be calculated using hydrodynamic equations, but these equations do not consider all mechanisms that contribute to the propulsion. Thus, the main purpose of this study was to compare the calculated effective propulsive force using the hydrodynamic equations and the measured effective propulsive force during a support sculling motion (vertical position with the head above the water‟s surface) in each phase of sculling. For this, a practitioner of synchronized swimming performed sculling motion in a vertical position with the head above the water‟s surface during 15 seconds, while kinematic and kinetic data were obtained by 3D videogrammetry and dynamometry respectively. Graphical techniques from Bland and Altman were used to compare the measured effective propulsive force and calculated effective propulsive force during sculling motion. The calculated effective propulsive force and the measured effective propulsive force were different, the measured being greater than the calculated. Moreover, the results indicated sculling motion performed was not symmetric, that is, the orientation and propulsive forces between the right and left hands were different. Therefore, the result of this study highlights the importance of the unsteady mechanisms for the propulsion during sculling motion, because the calculated forces using the hydrodynamic equations presented low values throughout the sculling motion.
APA, Harvard, Vancouver, ISO, and other styles
2

KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.

Full text
Abstract:
Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a general theory that takes into account the impact that the presence of an adversary has on the design of effective signal processing tools. By focusing on the application side of Adversarial Signal Processing, namely adversarial information fusion in distributed sensor networks, and adopting a game-theoretic approach, this thesis contributes to the above mission by addressing four issues. First, we address decision fusion in distributed sensor networks by developing a novel soft isolation defense scheme that protects the network from adversaries, specifically, Byzantines. Second, we develop an optimum decision fusion strategy in the presence of Byzantines. In the next step, we propose a technique to reduce the complexity of the optimum fusion by relying on a novel nearly-optimum message passing algorithm based on factor graphs. Finally, we introduce a defense mechanism to protect decentralized networks running consensus algorithm against data falsification attacks.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Synchronized attack"

1

Government, U. S. Planning Considerations: Complex Coordinated Terrorist Attacks - Homeland Security Threat Background and Characteristics, Synchronized and Independent Teams at Multiple Locations. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Synchronized attack"

1

Barbu, Guillaume, and Hugues Thiebeauld. "Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -." In Smart Card Research and Advanced Applications, 18–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27257-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Shreya, Rimjhim Kanaujia, and Shivaprakash M Rudramurthy. "Immunopathogenesis of Aspergillosis." In The Genus Aspergillus - Pathogenicity, Mycotoxin Production and Industrial Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.98782.

Full text
Abstract:
Aspergillus species are ubiquitous saprophytes and opportunistic pathogens causing wide spectrum of diseases in humans depending on the host immune status. Following pathogen entry, various soluble bronchopulmonary factors enhance conidial clearance. However, due to virulence factors and poor host immune response Aspergillus conidia bind and damage the airway epithelium. The host immune cells like neutrophils and macrophages recognise Aspergillus spp. through various pathogen recognition receptors and form reactive oxygen species which mediate conidial killing. Neutrophils also attack extracellular hyphae by oxidative attack, non-oxidative granule proteins and neutrophil extracellular traps. In case of adaptive immunity, Th1 cells are crucial sources of IFN-γ mediated protective immunity. The Th17 also display a highly pro-inflammatory which is counterbalanced by a Treg cell. B cells and antibodies also enhance fungal clearance although excessive IgE production may result in atopy. The immune responses are influenced by changes in production of short-chain fatty acids by the gut microbiome which primes cells toward Th2 responses, and this is synchronized by the Innate lymphoid cells. This review provides comprehensive knowledge of various virulence factors of Aspergillus, antifungal host defences including innate and humoral immune response and regulation of host immunity by microbiome.
APA, Harvard, Vancouver, ISO, and other styles
3

Söyleyici, Gülin Tuğçe, and Adnan Kalkan. "A New Problem Emerging With the Internet and Digital Media." In Advances in Social Networking and Online Communities, 420–32. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5426-8.ch025.

Full text
Abstract:
Today, with the developing technology, online social media and social network have emerged as a cultural reality. With the increase in the use of digital media, in the modern age where the real world and the virtual world can be experienced in a synchronized way, digital media offers many opportunities. However, the increase in the time spent on the internet also brings with it undesirable situations such as cyberbullying. Cyberbullying is an act of cyber aggression aimed at harassing or humiliating. Cyberbullying is the behavior that disrupts the social relations of those chosen as victims and aims to arouse negative emotions. Understanding how cyberbullying occurs is very important for the development of strategies to prevent and respond to this attack. In this chapter, the concepts of cyber violence, cyber bullying, traditional bullying, and cyber victimization are explained.
APA, Harvard, Vancouver, ISO, and other styles
4

Bamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, 74–94. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1941-6.ch004.

Full text
Abstract:
Internet usage has increased significantly across developing economies in last decade and most of the enterprises are extensively reliable on computer networks for electronic mails to payment gateways. But, the scenario we live in today has become more and more connected, sophisticated and risk-prone to our network-delivered society. Nevertheless, it remains critical for enterprises to exploit the full potential of available technologies such as mobile computing, smart computing and cloud computing. A cyber security related gaffe in any of these rapidly emerging domains may lead to lost productivity and grave concerns to the enterprise. The chapter highlights the various concerns associated to cyber security, viz., how an attack may be operated and offered measures to secure the network and information technology resources within and outside the enterprise. In most of the developing economies no synchronized activities in this regard are taking place which opens the opportunity to cyber criminals intrude into the system and compromise the resources.
APA, Harvard, Vancouver, ISO, and other styles
5

Bamrara, Atul. "Identifying and Analyzing the Latent Cyber Threats in Developing Economies." In Cyber Security and Threats, 1044–59. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch051.

Full text
Abstract:
Internet usage has increased significantly across developing economies in last decade and most of the enterprises are extensively reliable on computer networks for electronic mails to payment gateways. But, the scenario we live in today has become more and more connected, sophisticated and risk-prone to our network-delivered society. Nevertheless, it remains critical for enterprises to exploit the full potential of available technologies such as mobile computing, smart computing and cloud computing. A cyber security related gaffe in any of these rapidly emerging domains may lead to lost productivity and grave concerns to the enterprise. The chapter highlights the various concerns associated to cyber security, viz., how an attack may be operated and offered measures to secure the network and information technology resources within and outside the enterprise. In most of the developing economies no synchronized activities in this regard are taking place which opens the opportunity to cyber criminals intrude into the system and compromise the resources.
APA, Harvard, Vancouver, ISO, and other styles
6

Conde, Maite. "Toward New Cinematic Foundations." In Foundational Films, 242–46. University of California Press, 2018. http://dx.doi.org/10.1525/california/9780520290983.003.0012.

Full text
Abstract:
Adalberto Kemeny and Rodolfo Lustig’s dependency on São Paulo’s industrial and political elite to produce São Paulo, Symphony of a Metropolis was not exceptional. By the late 1920s American films occupied 80 percent of the Brazilian market, leaving little space for local production. Without full access to the domestic market, producers could not achieve adequate returns on their investments, and consequently the process of capital accumulation within the industry was stifled, as was production. Even the temporary disruption of the coming of sound did not end Hollywood’s ubiquity in Brazil. In fact, the arrival of the talkies further entrenched US cinema’s presence. The high costs of acquiring synchronized equipment meant that local investment lagged behind Hollywood and allowed the North American industry to maintain its hegemony. By the early 1930s, North American dubbing and subtitling techniques had proved popular among Brazilian audiences, and Hollywood increased its presence in the country. In the face of North America’s dominance, domestic production was unstable and unprofitable, and local producers were mostly unable to attain a sufficient return on their investments to allow them to develop on a larger scale. ...
APA, Harvard, Vancouver, ISO, and other styles
7

Legeżyńska, Joanna, Claude De Broyer, and Jan Marcin Węsławski. "Invasion of the Poles." In Evolution and Biogeography, 216–46. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190637842.003.0009.

Full text
Abstract:
Polar Crustacea show high taxonomic and functional diversity and hold crucial roles within regional food webs. Despite the differences in the evolutionary history of the two Polar regions, present data suggest rather similar species richness, with over 2,250 taxa recorded in the Antarctic and over 1,930 noted in the Arctic. A longer duration of isolated evolution resulted in a high percentage of endemic species in the Antarctic, while the relatively young Arctic ecosystem, subjected to advection from adjacent seas, shows a very low level of endemism. Low temperatures and seasonal changes of food availability have a strong impact on polar crustacean life histories, resulting in their slow growth and development, extended life cycles, and reproduction well synchronized with annual peaks of primary production. Many species, Antarctic amphipods in particular, exhibit a clear tendency to attain large size. In both regions, abundant populations of pelagic grazers play a pivotal role in the transport of energy and nutrients to higher trophic levels. The sea-ice habitat unique to polar seas supports a wide range of species, with euphausiids and amphipods being the most important in terms of biomass in the Antarctic and Arctic, respectively. Deep sea fauna remains poorly studied, with new species being collected on a regular basis. Ongoing processes, namely a decline of sea-ice cover, increasing levels of ultraviolet radiation, and invasions of sub-polar species, are likely to reshape crustacean communities in both Polar regions.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Synchronized attack"

1

Wang, Hongxia, Mingquan Fan, and Qing Qian. "Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack." In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE, 2011. http://dx.doi.org/10.1109/cse.2011.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Abdullah L., Ali T. Al-Awami, and Wessam Mesbah. "Attack Detection and Measurement Correction in Distribution Systems with Non-Synchronized Measurements." In 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2022. http://dx.doi.org/10.1109/isgt-europe54678.2022.9960624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Prasad, Romesh, Matthew K. Swanson, and Young Moon. "Recovering From Cyber-Manufacturing Attacks by Reinforcement Learning." In ASME 2022 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2022. http://dx.doi.org/10.1115/imece2022-93982.

Full text
Abstract:
Abstract A Cyber-Manufacturing systems (CMS) is an integration of informational and operational entities that are synchronized with manufacturing processes to increase productivity. However, this integration enlarges the scope for cyber attackers to intrude manufacturing processes, which are called cyber-manufacturing attacks. They can have significant impacts on physical operations within a CMS, such as shutting down plants, production interruption, premature failure of products, and fatal accidents. Although research activities in this emerging problem have been increased recently, existing research has been limited to detection and prevention solutions. However, these strategies cannot ensure a continuous function of an attacked CMS. To ensure continuous functioning of a CMS, a robust recovery strategy must be developed and employed. Current research in recovery has been limited to feedback controllers with an assumption of a complete knowledge of a system model. To overcome this limitation, a recovery agent augmented by reinforcement learning was developed. This is to utilize the ability of reinforcement learning to handle sequential decisions and to proceed even without a complete knowledge of a system model. A virtual environment for recovery agents has been developed to assist efforts needed to obtain sample data, experiment various scenarios, and explore with reinforcement learning. Two cyber-manufacturing attack scenarios have been developed: (i) spoofing a stepper motor controlling additive manufacturing processes, (ii) disrupting the sequence of the pick and place robot. The recovery agent takes random actions by exploring its environment and receives rewards from the actions. After many iterations, it learns proper actions to take.
APA, Harvard, Vancouver, ISO, and other styles
4

Ling, Yang, and Chu Weihua. "Research on movement relationship and synchronized motion control strategy for the attack angle device of the 2.4m transonic wind tunnel." In 2016 IEEE International Conference on Mechatronics and Automation. IEEE, 2016. http://dx.doi.org/10.1109/icma.2016.7558569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prier, Michael W., and James A. Liburdy. "Discrete Vortex Modeling of a Flapping Foil With Activated Leading Edge Motion." In ASME-JSME-KSME 2019 8th Joint Fluids Engineering Conference. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/ajkfluids2019-4964.

Full text
Abstract:
Abstract Energy harvesting performance for a flapping foil device is evaluated to determine how activated leading edge motion affects the aerodynamic forces and the cycle power generated. Results are obtained for a thin flat foil that pitches about the mid-chord and operates in the reduced frequency range of k = fc/U of 0.06–0.10 and Reynolds numbers of 20,000 and 30,000 with a pitching amplitude of 70° and heaving amplitude of h0 = 0.5c. Time resolved data are presented based on direct force measurements and are used to determine overall cycle efficiency and coefficient of power. These results are compared against a panel-based discrete vortex model to predict power production. The model incorporates a leading edge suction parameter predictor for vortex shedding and empirical adjustments to circulatory forces. It is found that the leading edge motions that reduce the effective angle of attack early in a flapping stroke generate larger forces later in the stroke. Consequently, the energy harvesting efficiencies and power coefficients are increased since the generated aerodynamic loads are better synchronized with the foil motion. The efficiency gains are reduced with increasing reduced frequencies.
APA, Harvard, Vancouver, ISO, and other styles
6

Riedel, Colton, Guoyu Fu, Donald Beyette, and Jyh-Charn Liu. "Measurement System Timing Integrity in the Presence of Faults and Malicious Attacks." In 2019 International Conference on Smart Grid Synchronized Measurements and Analytics (SGSMA). IEEE, 2019. http://dx.doi.org/10.1109/sgsma.2019.8784502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jin, Chenglu, Lingyu Ren, Xubin Liu, Peng Zhang, and Marten van Dijk. "Mitigating Synchronized Hardware Trojan Attacks in Smart Grids." In CPS Week '17: Cyber Physical Systems Week 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3055386.3055394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ammour, Rabah, Leonardo Brenner, Isabel Demongodin, Said Amari, and Dimitri Lefebvre. "Costs analysis of stealthy attacks with bounded output synchronized Petri nets." In 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE). IEEE, 2021. http://dx.doi.org/10.1109/case49439.2021.9551583.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mattei, Andrew K., W. Mack Grady, P. Jay Caspary, and Scott A. McBride. "Detection of time spoofing attacks on GPS synchronized phasor measurement units." In 2016 69th Annual Conference for Protective Relay Engineers (CPRE). IEEE, 2016. http://dx.doi.org/10.1109/cpre.2016.7914884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Blum, Ronny, Himanshu Sharma, and Thomas Pany. "Smartphone Behaviour under Sophisticated Time Synchronized and Record and Replay Spoofing Attacks." In 2022 International Technical Meeting of The Institute of Navigation. Institute of Navigation, 2022. http://dx.doi.org/10.33012/2022.18183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography