A.Annamalai giriMr. Yogananda. pM. Nithya
The proposed topology for a wireless networked control system is learnt under several cyber-attack situations, and a distributed intrusion detection system (IDS) is created to see the presence of attacks. More particularly, the paper shows a modeling structure for the closed-loop control system with the IDS, and a computational method to create and compute the IDS. The computational procedure delivers a stable closed-loop control system with the IDS being sensitive to cyber-attacks. Also, a simulation example is used to demonstrate the application of the proposed procedure as well as its effectiveness.
Mostofa AhsanNafiz RifatMd Minhaz ChowdhuryRahul Gomes
Priyanka SharmaRakesh Singh Kunwar
Priyanka SharmaRakesh Singh Kunwar
Sharma, PriyankaKunwar, Rakesh Singh
Hasika PamunuwaDuminda WijesekeraCsilla Farkas