98%
921
2 minutes
20
This paper investigates the problem of the observer-based resilient event-triggered control for stochastic Markovian jump systems subject to probabilistic cyber attacks, actuator failures, and controller gain variations. The observer is modelled to estimate all state information of the system from measurement outputs, and then the controller is designed using observer states. Besides, probabilistic cyber attacks have a significant negative impact on communication security in networked control systems, potentially leading to a decrease in system stability and performance. To eliminate threats from probabilistic cyber attacks, an event-triggered scheme is considered in the communication between the observer and controller, which also has the advantage of minimising communication resource consumption and alleviating pressure on network bandwidth. Then, an actuator fault model and gain variations of the controller are taken into account simultaneously, which makes the analysis and synthesis more practical. By employing a discontinuous Lyapunov functional, updated stochastic inequality, and improved Wirtinger-based integral inequality, a new set of delay-dependent sufficient conditions is constructed to design the controller such that the proposed systems is stochastically stable. Then, the derived theoretical results are validated by using numerical examples.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12316926 | PMC |
http://dx.doi.org/10.1038/s41598-025-12834-6 | DOI Listing |
This study aims to tackle the tracking control problem of multiple unmanned surface vessels (USVs). It considers the impact of connectivity-hybrid cyber-attacks in the networked level, and wave-induced disturbances, as well as severe and nonsevere unified modeling rudder angle faults in the physical level. To do this, the study establishes USV models, taking into account actuator fault and cyber-attack modeling.
View Article and Find Full Text PDFSci Rep
September 2025
Fukushima Renewable Energy Institute, National Institute of Advanced Industrial Science and Technology (AIST), Fukushima, 9630298, Koriyama, Japan.
The increasing adoption of the Internet of Things (IoT) in energy systems has brought significant advancements but also heightened cyber security risks. Virtual Power Plants (VPPs), which aggregate distributed renewable energy resources into a single entity for participation in energy markets, are particularly vulnerable to cyber-attacks due to their reliance on modern information and communication technologies. Cyber-attacks targeting devices, networks, or specific goals can compromise system integrity.
View Article and Find Full Text PDFThis paper presents a novel multiscale signal processing framework for power quality disturbance (PQD) and cyber intrusion detection in smart grids, combining Non-Subsampled Contourlet Transform (NSCT), Split Augmented Lagrangian Shrinkage Algorithm (SALSA), and Morphological Component Analysis (MCA). A key innovation lies in an adaptive weighting mechanism within NSCT's directional sub bands, enabling dynamic energy redistribution and enhanced representation of both low-frequency anomalies (e.g.
View Article and Find Full Text PDFISA Trans
September 2025
School of Science, Yanshan University, Qinhuangdao Hebei, 066004, PR China. Electronic address:
This article concentrates on the issue of event-triggered dynamic output feedback control for Markovian jump complex dynamical networks (MJCNDs) subject to multiple cyberattacks. To alleviate the communication pressure, a new adaptive event-triggered mechanism (AETM) is proposed. This AETM incorporates a dynamically adjustable parameter and mode-dependent properties to enhance flexibility.
View Article and Find Full Text PDFHealth Aff Sch
August 2025
Price School of Public Policy, University of Southern California, Los Angeles, CA 90089, United States.
Over the past decade, the electronic health record (EHR) market has become increasingly consolidated, with the majority of care delivery organizations now using 1 of 2 vendors -Epic and Oracle Health. This consolidation creates a "single-point-of-failure" tail risk for cybersecurity: 1 successful attack could expose millions of patients' private data and could potentially impact documentation, billing, and clinical care across thousands of sites. Moreover, dependence on other technology vendors, such as shared cloud hosts, broadens the potential attack surface beyond vendors' core firewalls.
View Article and Find Full Text PDF