Deep search:Searching for "cyber attacks" in 'ABSTRACT and KEYWORDGot 10 items.
index Title
1On modeling of electrical cyber-physical systems considering cyber security
Author(s):Yi-nan Wang, Zhi-yun Lin, Xiao Lia...  Clicked:7765  Download:3015  Cited:3  <Full Text>  <PPT> 2372
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.5 P.465-478  DOI:10.1631/FITEE.1500446
2Stochastic stability analysis of networked control systems with random cryptographic protection under rando...
Author(s):Meng-zhou Gao, Dong-qin Feng  Clicked:9673  Download:3056  Cited:0  <Full Text>  <PPT> 2116
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.9 P.1098-1111  DOI:10.1631/FITEE.1700334
3Cyber security meets artificial intelligence: a survey
Author(s):Jian-hua Li  Clicked:7690  Download:2939  Cited:0  <Full Text>  <PPT> 2052
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.12 P.1462-1474  DOI:10.1631/FITEE.1800573
4Distribution system state estimation: an overview of recent developments
Author(s):Gang Wang, Georgios B. Giannakis, ...  Clicked:6893  Download:2506  Cited:0  <Full Text>  <PPT> 1870
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.1 P.4-17  DOI:10.1631/FITEE.1800590
5Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional net...
Author(s):Yang Chen, Hong-chao HU, Guo-zhen ...  Clicked:8514  Download:2902  Cited:0  <Full Text>  <PPT> 2001
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.2 P.238-252  DOI:10.1631/FITEE.1800516
6Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
Author(s):S. Aashiq Banu, Rengarajan Amirtha...  Clicked:6364  Download:5521  Cited:0  <Full Text>  <PPT> 1902
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.940-956  DOI:10.1631/FITEE.2000071
7Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts
Author(s):Chunlin XIONG, Zhenyuan LI, Yan CH...  Clicked:7607  Download:7951  Cited:0  <Full Text>  <PPT> 618
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.3 P.361-381  DOI:10.1631/FITEE.2000436
8Detection and localization of cyber attacks on water treatment systems: an entropy-based approach
Author(s):Ke LIU, Mufeng WANG, Rongkuan MA, ...  Clicked:7926  Download:10948  Cited:0  <Full Text>  <PPT> 565
Frontiers of Information Technology & Electronic Engineering  2022 Vol.23 No.4 P.587-603  DOI:10.1631/FITEE.2000546
9Privacy and security federated reference architecture for Internet of Things
Author(s):Musab KAMAL, Imran RASHID, Waseem ...  Clicked:2543  Download:8066  Cited:0  <Full Text>  <PPT> 436
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.4 P.481-508  DOI:10.1631/FITEE.2200368
10Event-triggered finite-time command-filtered tracking control for nonlinear time-delay cyber physical syste...
Author(s):Yajing MA, Yuan WANG, Zhanjie LI, ...  Clicked:1821  Download:1616  Cited:0  <Full Text>  <PPT> 417
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.2 P.225-236  DOI:10.1631/FITEE.2300613
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE