Pages that link to "Item:Q5854043"
From MaRDI portal
The following pages link to The Vulnerability of Cyber-Physical System Under Stealthy Attacks (Q5854043):
Displaying 21 items.
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (Q2063783) (← links)
- The vulnerability of distributed state estimator under stealthy attacks (Q2065222) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- Reachability Analysis for Linear Discrete-Time Systems Under Stealthy Cyber Attacks (Q4957746) (← links)
- A zonotopic characterization of cyber‐physical system vulnerabilities (Q6063748) (← links)
- Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach (Q6069272) (← links)
- Vulnerability analysis of distributed state estimation under joint deception attacks (Q6073113) (← links)
- Security of networked control systems subject to deception attacks: a survey (Q6099319) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Neural network-based adaptive event-triggered control for cyber-physical systems under resource constraints and hybrid cyberattacks (Q6103047) (← links)
- Dynamic event-triggered output feedback control for networked Markovian jump systems under hybrid attacks (Q6136516) (← links)
- Performance analysis for cyber-physical systems under two types of stealthy deception attacks (Q6152568) (← links)
- Window-type detector for stealthy false data injection attack in cyber-physical systems (Q6164484) (← links)
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems (Q6182088) (← links)
- Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels (Q6190376) (← links)
- Trustworthiness analysis and evaluation for command and control cyber-physical systems using generalized stochastic Petri nets (Q6196465) (← links)
- A stealthy man-in-the-middle attack strategy for switched systems (Q6544841) (← links)
- Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks (Q6585389) (← links)
- Nonlinear stealthy attacks on remote state estimation (Q6585394) (← links)
- Asymmetrical vulnerability of heterogeneous multi-agent systems under false-data injection attacks (Q6659230) (← links)
- Two-channel stealthy false data injection attacks design without estimator knowledge (Q6663595) (← links)