Search Results - "de Sa, Alan Oliveira"
-
1
A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems
Published in Sensors (Basel, Switzerland) (04-05-2021)“…In the maritime sector, the integration of radar systems, Automatic Identification System (AIS) and Electronic Chart Display and Information System (ECDIS)…”
Get full text
Journal Article -
2
Towards a Secure and Scalable Maritime Monitoring System Using Blockchain and Low-Cost IoT Technology
Published in Sensors (Basel, Switzerland) (29-06-2022)“…Maritime Domain Awareness (MDA) is a strategic field of study that seeks to provide a coastal country with an effective monitoring of its maritime resources…”
Get full text
Journal Article -
3
Identification of Data Injection Attacks in Networked Control Systems Using Noise Impulse Integration
Published in Sensors (Basel, Switzerland) (31-01-2020)“…The benefits of using Networked Control Systems (NCS) in the growing Industry 4.0 arenumerous, including better management and operational capabilities, as…”
Get full text
Journal Article -
4
Covert Attacks in Cyber-Physical Control Systems
Published in IEEE transactions on industrial informatics (01-08-2017)“…The advantages of using communication networks to interconnect controllers and physical plants motivate the increasing number of networked control systems in…”
Get full text
Journal Article -
5
Model-Based Stealth Attack to Networked Control System Based on Real-Time Ethernet
Published in IEEE transactions on industrial electronics (1982) (01-08-2021)“…In this article, industrial control systems include networked control systems (NCS), which use real-time Ethernet (RTE) protocols since many years, well before…”
Get full text
Journal Article -
6
Artificial Neural Network-Based Stealth Attack on Battery Energy Storage Systems
Published in IEEE transactions on smart grid (01-11-2021)“…As the number of installed Battery Energy Storage Systems (BESSs) increases, the concerns related to possible cyber-attacks to these systems rise accordingly…”
Get full text
Journal Article -
7
A hybrid cyber–physical risk identification method for grid-connected photovoltaic systems
Published in Sustainable Energy, Grids and Networks (01-09-2024)“…Identifying risks in modern electric power systems is essential, and one of the main difficulties concerns covering the wide range of technologies that…”
Get full text
Journal Article -
8
Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems
Published in Mobile networks and applications (01-10-2020)“…From the point of view of the control theory, the literature indicates that stealthy and accurate cyber-physical attacks on Networked Control System (NCS) must…”
Get full text
Journal Article -
9
Evaluation on Passive System Identification and Covert Misappropriation Attacks in Large Pressurized Heavy Water Reactors
Published in 2018 Workshop on Metrology for Industry 4.0 and IoT (01-04-2018)“…The recent literature on nuclear science demonstrates the feasibility and the benefits of controlling large Pressurized Heavy Water Reactors (PHWR) through…”
Get full text
Conference Proceeding -
10
Distributed and resilient localization algorithm for Swarm Robotic Systems
Published in Applied soft computing (01-08-2017)“…[Display omitted] Many applications of Swarm Robotic Systems (SRSs) require each robot to be able to discover its own position. To provide such capability,…”
Get full text
Journal Article -
11
Distributed efficient localization in swarm robotic systems using swarm intelligence algorithms
Published in Neurocomputing (Amsterdam) (08-01-2016)“…The localization problem arises from the need of robots of a swarm robotic system (SRS), or even nodes of a wireless sensors network (WSN), to determine their…”
Get full text
Journal Article -
12
Distributed efficient localization in swarm robotics using Min–Max and Particle Swarm Optimization
Published in Expert systems with applications (15-05-2016)“…•We propose an efficient localization method for swarm robotic systems.•The method, based on Min–Max and PSO algorithms, presents low positioning error.•We…”
Get full text
Journal Article -
13
Autoencoder-based Approach to Detect Stealth Cyberattacks in Battery Energy Storage Systems
Published in 2024 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0 & IoT) (29-05-2024)“…This paper addresses the detection of anomalies caused by stealth data injection attacks in battery energy storage systems (BESS). The proposed solution relies…”
Get full text
Conference Proceeding -
14
Data Acquisition and extraction on mobile devices-A Review
Published in 2022 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT) (07-06-2022)“…Forensic Science comprises a set of technical-scientific knowledge used to solve illicit acts. The increasing use of mobile devices as the main computing…”
Get full text
Conference Proceeding -
15
Countermeasure for Identification of Controlled Data Injection Attacks in Networked Control Systems
Published in 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0&IoT) (01-06-2019)“…Networked Control Systems (NCS) are widely used in Industry 4.0 to obtain better management and operational capabilities, as well as to reduce costs. However,…”
Get full text
Conference Proceeding -
16
Merging Electronic, Cybernetic and Kinetic Warfare in Naval Systems
Published in 2019 SBMO/IEEE MTT-S International Microwave and Optoelectronics Conference (IMOC) (10-11-2019)“…This paper presents a taxonomy that encompasses new classes of attack that exploit the cyber domain together with the electronic and kinetic domains. The…”
Get full text
Conference Proceeding -
17
Use of Switching Controllers for Mitigation of Active Identification Attacks in Networked Control Systems
“…The literature regarding to cyber-physical attacks in Networked Control Systems (NCS) indicates that covert and accurate attacks must be planned based on an…”
Get full text
Conference Proceeding -
18
True Random Number Generators for Batch Control Sampling in Smart Factories
Published in 2018 Workshop on Metrology for Industry 4.0 and IoT (01-04-2018)“…This paper presents the assembling of a simple photo quantum true random number generator that can be easily adapted to provide a web service for randomness…”
Get full text
Conference Proceeding -
19
Evasion Techniques for VM-based Black-Box Software Analysis
Published in 2022 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT) (07-06-2022)“…One of the great challenges in the process of black-box testing is the fact that it's possible for an application to hide malicious behavior after detecting…”
Get full text
Conference Proceeding -
20
ANN-Based Stealth Attack to Battery Energy Storage Systems by Using a Low-Cost Device
Published in 2022 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0&IoT) (07-06-2022)“…The application of the Internet of Things paradigm to the power and energy sector is opening the way to advanced monitoring and control capabilities over…”
Get full text
Conference Proceeding