Pages that link to "Item:Q2005526"
From MaRDI portal
The following pages link to Optimal stealthy false data injection attacks in cyber-physical systems (Q2005526):
Displaying 43 items.
- Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements (Q314801) (← links)
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems (Q826753) (← links)
- Worst-case stealthy innovation-based linear attack on remote state estimation (Q1640242) (← links)
- A data-driven covert attack strategy in the closed-loop cyber-physical systems (Q1796672) (← links)
- Sliding-mode secure control for jump cyber-physical systems with malicious attacks (Q2027392) (← links)
- Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems (Q2027448) (← links)
- Distributed active disturbance rejection control for Ackermann steering of a four-in-wheel motor drive vehicle with deception attacks on controller area networks (Q2053812) (← links)
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis (Q2055571) (← links)
- Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks (Q2056334) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme (Q2109274) (← links)
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach (Q2203055) (← links)
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems (Q2224736) (← links)
- Optimal deception attacks against remote state estimation in cyber-physical systems (Q2297415) (← links)
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs (Q2409156) (← links)
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems (Q2660860) (← links)
- Leader-following bipartite consensus of multiple uncertain Euler-Lagrange systems under deception attacks (Q2671858) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- Security Against False Data-Injection Attack in Cyber-Physical Systems (Q4969453) (← links)
- Optimal Partial Feedback Attacks in Cyber-Physical Power Systems (Q5125817) (← links)
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks (Q5358527) (← links)
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks (Q5854043) (← links)
- Security of networked control systems subject to deception attacks: a survey (Q6099319) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Optimal stealthy attack with historical data on cyber-physical systems (Q6109035) (← links)
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (Q6117503) (← links)
- Detection and defense of time‐varying formation for unmanned aerial vehicles against false data injection attacks and external disturbance (Q6117629) (← links)
- Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach (Q6122280) (← links)
- Adaptive sliding-mode tracking control of networked control systems with false data injection attacks (Q6149511) (← links)
- Leader‐following consensus of multiple uncertain Euler–Lagrange systems under denial‐of‐service attacks (Q6149729) (← links)
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems (Q6154461) (← links)
- Window-type detector for stealthy false data injection attack in cyber-physical systems (Q6164484) (← links)
- Optimal attack strategy against fault detectors for linear cyber-physical systems (Q6180214) (← links)
- A defense strategy for false data injection attacks in multi-agent systems (Q6191346) (← links)
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems (Q6199483) (← links)
- Privacy and security trade-off in cyber-physical systems: an information theory-based framework (Q6498553) (← links)
- Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems (Q6562327) (← links)
- Analysis of stealthy false data injection attacks against networked control systems: three case studies (Q6594927) (← links)
- Sensor attack detection for cyber-physical systems based on frequency domain partition (Q6598768) (← links)
- On vulnerability of Kalman filtering with holistic estimation performance loss (Q6659175) (← links)
- Optimal design and performance analysis of secure estimator for cyber-physical systems against deception attacks (Q6662124) (← links)
- Two-channel stealthy false data injection attacks design without estimator knowledge (Q6663595) (← links)