Integrating Intelligent Breach Detection System into 6 g Enabled Smart Grid-Based Cyber Physical Systems (original) (raw)
References
Jithish, J., Mahalingam, N., Seng, Y. K., et al. (2024). Empowering Smart Grid Security: Towards Federated Learning in 6G-Enabled Smart Grids using Cloud. PREPRINT (Version 1) available at Research Square. https://doi.org/10.21203/rs.3.rs-3834382/v1
Sun, G., Xu, Z., Yu, H., Chen, X., Chang, V., & Vasilakos, A. V. (2020). Low-latency and resource-efficient service function chaining Orchestration in network function virtualization. IEEE Internet of Things Journal, 7(7), 5760–5772.
Sun, G., Liao, D., Zhao, D., Xu, Z., & Yu, H. (2018). Live Migration for multiple correlated virtual machines in Cloud-Based Data centers. IEEE Transactions on Services Computing, 11(2), 279–291. Article Google Scholar
Kang, W., Liu, Q., Zhu, P., Zhao, W., Liu, X., & Hu, G. (2021). Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids. Wireless Networks, 1–16.
Dai, M., Sun, G., Yu, H., & Niyato, D. (2024). Maximize the Long-Term Average revenue of network slice provider via Admission Control among heterogeneous slices. IEEE/ACM Transactions on Networking, 32(1), 745–760. Article Google Scholar
Yin, F., Fritsche, C., Jin, D., Gustafsson, F., & Zoubir, A. M. (2015). Cooperative Localization in WSNs using Gaussian Mixture modeling: Distributed ECM algorithms. IEEE Transactions on Signal Processing, 63(6), 1448–1463.
Cao, K., Wang, B., Ding, H., Lv, L., Tian, J., Hu, H., & Gong, F. (2021). Achieving Reliable and Secure communications in Wireless-Powered NOMA systems. IEEE Transactions on Vehicular Technology, 70(2), 1978–1983.
Liu, D., Cao, Z., Jiang, H., Zhou, S., Xiao, Z., & Zeng, F. (2022). Concurrent low-power listening: A New Design Paradigm for Duty-Cycling communication. ACM Trans Sen Netw, 19(1).
Alsharif, M. H., Jahid, A., Kannadasan, R., & Kim, M. K. (2024). Unleashing the potential of sixth generation (6G) wireless networks in smart energy grid management: A comprehensive review. Energy Reports, 11, 1376–1398. Article Google Scholar
Dai, X., Xiao, Z., Jiang, H., & Lui, J. C. S. (2024). UAV-Assisted Task Offloading in Vehicular Edge Computing Networks. In IEEE Transactions on Mobile Computing, 23(4), 2520–2534. https://doi.org/10.1109/TMC.2023.3259394
Alohali, M. A., Al-Wesabi, F. N., Hilal, A. M., Goel, S., Gupta, D., & Khanna, A. (2022). Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cognitive Neurodynamics, 16(5), 1045–1057. Article Google Scholar
Jiang, H., Dai, X., Xiao, Z., & Iyengar, A. K. (2023). Joint Task Offloading and Resource Allocation for Energy-Constrained Mobile Edge Computing. In IEEE Transactions on Mobile Computing, 22(7), 4000–4015. https://doi.org/10.1109/TMC.2022.3150432
Jiang, H., Xiao, Z., Li, Z., Xu, J., Zeng, F., & Wang, D. (2022). An energy-efficient Framework for internet of things underlaying heterogeneous small cell networks. IEEE Transactions on Mobile Computing, 21(1), 31–43.
Zheng, W., Deng, P., Gui, K., & Wu, X. (2023). An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis. Information and Software Technology, 107194.
Chen, Y., Zhu, L., Hu, Z., Chen, S., & Zheng, X. (2022). Risk propagation in Multilayer Heterogeneous Network of coupled system of large Engineering Project. Journal of Management in Engineering, 38(3), 4022003. Article Google Scholar
Yu, J., Lu, L., Chen, Y., Zhu, Y., & Kong, L. (2021). An indirect eavesdropping attack of keystrokes on Touch screen through Acoustic Sensing. IEEE Transactions on Mobile Computing, 20(2), 337–351. Article Google Scholar
Wu, Z., Liu, G., Wu, J., & Tan, Y. (2023). Are neighbors alike? A Semisupervised Probabilistic Collaborative Learning Model for Online Review spammers detection. Information Systems Research, 1–39. https://doi.org/10.2139/ssrn.4013130
Hu, J., Wu, Y., Li, T., & K Ghosh, B. (2019). Consensus Control of General Linear Multiagent Systems with Antagonistic Interactions and communication noises. IEEE Transactions on Automatic Control, 64(5), 2122–2127. ArticleMathSciNet Google Scholar
Chen, B., Hu, J., Zhao, Y., & Ghosh, B. K. (2022). Finite-Time velocity-free Rendezvous Control of multiple AUV Systems with Intermittent Communication. IEEE Transactions on Systems Man and Cybernetics: Systems, 52(10), 6618–6629.
Zhao, L., Xu, H., Qu, S., Wei, Z., & Liu, Y. (2024). Joint Trajectory and Communication Design for UAV-Assisted Symbiotic Radio Networks. In IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2024.3356587
Tang, Q., Qu, S., Zhang, C., Tu, Z., & Cao, Y. (2024). Effects of impulse on prescribed-time synchronization of switching complex networks. Neural Networks, 174, 106248. Article Google Scholar
Xuemin, Z., Ying, R., Zenggang, X., Haitao, D., Fang, X., & Yuan L. (2023). Resource-Constrained and socially selfish-based incentive algorithm for socially aware networks. Journal of Signal Processing Systems, 95(12), 1439–1453.
Fu, X., Pace, P., Aloi, G., Guerrieri, A., Li, W., & Fortino, G. (2023). Tolerance analysis of Cyber-manufacturing systems to cascading failures. Acm Transactions on Internet Technology, 23(4), 1–23.
Hu, X., Tan, L., & Tang, T. (2024). M2BIST-SPNet: RUL prediction for railway signaling electromechanical devices. J Supercomput. https://doi.org/10.1007/s11227-024-06111-y
Xiao, N., Wang, Y., Chen, L., Wang, G., Wen, Y., & Li, P. (2023). Low-frequency dual-driven Magnetoelectric Antennas with enhanced transmission efficiency and broad bandwidth. IEEE Antennas and Wireless Propagation Letters, 22(1), 34–38. Article Google Scholar
Gao, N., Han, Y., Li, N., Jin, S., & Matthaiou M. (2024). When Physical Layer Key Generation Meets RIS: Opportunities, Challenges, and Road Ahead. In IEEE Wireless Communications. https://doi.org/10.1109/MWC.013.2200538
Cheng, B., Wang, M., Zhao, S., Zhai, Z., Zhu, D., & Chen, J. (2017). Situation-Aware Dynamic Service Coordination in an IoT Environment. IEEE/ACM Transactions on Networking, 25(4), 2082–2095.
Wang, R., Gu, Q., Lu, S., Tian, J., Yin, Z., Yin, L., & Zheng W. (2024). W FI-NPI: Exploring Optimal Control in Parallel Platform Systems. Electronics, 13(7), 1168.
Jiang, H., Wang, M., Zhao, P., Xiao, Z., & Dustdar, S. (2021). A Utility-Aware General Framework with quantifiable privacy preservation for destination prediction in LBSs. Ieee/Acm Transactions on Networking, 29(5), 2228–2241. Article Google Scholar
Kasongo, S. M., & Sun, Y. (2020). Performance analysis of intrusion detection systems using a feature selection method on the UNSW-NB15 dataset. Journal of Big Data, 7, 1–20. Article Google Scholar
Li, K., Ji, L., Yang, S., Li, H., & Liao, X. (2022). Couple-Group Consensus of Cooperative–competitive heterogeneous Multiagent systems: A fully distributed event-triggered and Pinning Control Method. IEEE Transactions on Cybernetics, 52(6), 4907–4915. Article Google Scholar