A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index
From MaRDI portal
Publication:2224724
DOI10.1016/j.jfranklin.2018.09.028zbMath1455.93077OpenAlexW2895339937MaRDI QIDQ2224724
Publication date: 4 February 2021
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2018.09.028
Control/observation systems involving computers (process control, etc.) (93C83) (H^infty)-control (93B36) Networked control (93B70)
Related Items
Cites Work
- Unnamed Item
- Network-based \(H_\infty\) filtering using a logic jumping-like trigger
- Distributed event-triggered \(H_\infty\) filtering over sensor networks with communication delays
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- State estimation under false data injection attacks: security analysis and system protection
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
- \(H_\infty\) filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks
- Worst-case stealthy innovation-based linear attack on remote state estimation
- A stochastic game approach to the security issue of networked control systems under jamming attacks
- A secure control framework for resource-limited adversaries
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults
- An LMI approach to \(\mathcal H_{-}\) index and mixed \(\mathcal H_{-} / \mathcal H_{\infty}\) fault detection observer design
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Input-to-State Stabilizing Control Under Denial-of-Service
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- Competitive Interaction Design of Cooperative Systems Against Attacks
- Attack Detection and Identification in Cyber-Physical Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks