Semantic Scholar uses AI to extract papers important to this topic.
This paper proposes attack-resilient distributed control for synchronization of islanded, networked, inverter-based microgrids… Expand In this study, we examine the abuse of online social networks at the hands of spammers through the lens of the tools, techniques… Expand We describe and evaluate a detection-based algorithm for tracking a variable number of dynamic targets online. The algorithm… Expand Wearable and implantable medical devices are being increasingly deployed to improve diagnosis, monitoring, and therapy for a… Expand In this paper we study the effect of false data injection attacks on state estimation carried over a sensor network monitoring a… Expand This paper seeks to discover whether aviation security measures are cost-effective by considering their effectiveness, their cost… Expand There have been many incidents of prefix hijacking in the Internet. The hijacking AS can blackhole the hijacked traffic… Expand This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and… Expand Buffer overflow attacks are the predominant threat to the secure operation of network and in particular, Internetbased… Expand Industrial Society is susceptibile to catastrophic events, including technological disasters and social and political crises… Expand