Medium access scheduling for input reconstruction under deception attacks
DOI10.1016/j.jfranklin.2016.08.023zbMath1367.93662OpenAlexW2515183578MaRDI QIDQ2012091
Mohamed Amine Sid, Shaikshavali Chitraganti, Karim Chabir
Publication date: 28 July 2017
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2016.08.023
communication networkcyber-physical systemsmodified Kalman filterrandom deception attacksensor scheduling co-designstate filtering scheme
Filtering in stochastic control theory (93E11) Communication networks in operations research (90B18) Estimation and detection in stochastic control theory (93E10) Stochastic scheduling theory in operations research (90B36) Computer system organization (68M99)
Related Items
Cites Work
- Unnamed Item
- Schedule and control co-design for networked control systems with bandwidth constraints
- Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy - a survey and some new results
- Communication and control co-design for networked control systems
- Unbiased minimum variance estimation for systems with unknown exogenous inputs
- A stochastic game approach to the security issue of networked control systems under jamming attacks
- Co-design of dynamic scheduling and quantized control for networked control systems
- Design of robust \(H\infty\) fault detection filter for uncertain time-delay systems using canonical form approach
- Optimal fault detection design via iterative estimation methods for industrial control systems
- Fault diagnosis in a networked control system under communication constraints: a quadrotor application
- Safe and Secure Networked Control Systems under Denial-of-Service Attacks
- Kalman Filter for Discrete-Time Stochastic Linear Systems Subject to Intermittent Unknown Inputs