Author:
Hu Gebiao,Lin Zhichi,Guo Zheng,Xu Ruiqing,Zhang Xiao
Publisher
Springer Nature Switzerland
Reference12 articles.
1. Hongying, L., Tianrong, Z.: Research on recognition method of abnormal communication behavior in mobile wireless sensor network. Chinese J. Sens. Actuators 35(2), 240–245 (2020)
2. Ying, K., Zhihua, Z., Hao, W., Yaxing, L., Jin, M.: Deep SVDD-based anomaly detection method for communication signals. Syst. Eng. Electron. 44(7), 2319–2328 (2022)
3. Taoufik, A., Defoort, M., Busawon, K., Dala, L., Djemai, M.: A distributed observer-based cyber-attack identification scheme in cooperative networked systems under switching communication topologies. Electronics 9(11), 1912 (2020)
4. Liu, S., Wang, S., Liu, X.Y., Lin, C.T.: Fuzzy detection aided real-time and robust visual tracking under complex environments. IEEE Trans. Fuzzy Syst. 29(1), 90–102 (2021)
5. Gupta, K., Sahoo, S., Panigrahi, B.K., Blaabjerg, F., Popovski, P.: On the assessment of cyber risks and attack surfaces in a real-time co-simulation cybersecurity testbed for inverter-based microgrids. Energies 14(16), 4941 (2021)