Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations

From MaRDI portal
Publication:1797083

DOI10.1016/j.automatica.2018.04.006zbMath1400.93189arXiv1608.04103OpenAlexW2963076019MaRDI QIDQ1797083

Rong Su

Publication date: 17 October 2018

Published in: Automatica (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1608.04103



Related Items

Robust decentralized diagnosability of networked discrete event systems against DoS and deception attacks, Probabilistic state estimation for labeled continuous time Markov models with applications to attack detection, Discrete-event systems subject to unknown sensor attacks, A Framework for the Analysis of Supervised Discrete Event Systems Under Attack, Deterministic supervisory control with flexible upper-bounds on observation delay and control delay, Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks, Performance safety enforcement in stochastic event graphs against boost and slow attacks, Synthesis of covert actuator and sensor attackers, An efficient simulation procedure for the expected opportunity cost using metamodels, Hybrid-triggered interval type-2 fuzzy control for networked systems under attacks, Secret inference and attacktability analysis of discrete event systems, Robust corrective control against fundamental and non-fundamental mode attacks with application to an asynchronous digital system, Synthesis of optimal covert sensor-actuator attackers for discrete-event systems, On decidability of existence of nonblocking supervisors resilient to smart sensor attacks, Design and implementation of robust corrective control systems with permanent sensor faults, Synthesis of covert actuator attackers for free, Robust corrective control against a class of actuator attacks in input/state asynchronous sequential machines, Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems, Performance safety enforcement in strongly connected timed event graphs, Adaptive control of cyber-physical systems under deception and injection attacks, Observation-assisted heuristic synthesis of covert attackers against unknown supervisors, Dealing with sensor and actuator deception attacks in supervisory control, Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies



Cites Work