Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack - MaRDI portal

Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack

From MaRDI portal
Publication:5211258

DOI10.1109/TAC.2019.2903429zbMath1482.93095OpenAlexW2921584596WikidataQ128298980 ScholiaQ128298980MaRDI QIDQ5211258

Chanhwa Lee, Karl Henrik Johansson, Gyunghoon Park, Yongsoon Eun, Hyungbo Shim

Publication date: 28 January 2020

Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tac.2019.2903429




Related Items (15)

Security weakness of dynamic watermarking-based detection for generalised replay attacksPeriodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systemsStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachA synthesis approach for networked MPC of linear system with double-sided arbitrary bounded delays and packet lossesQuickest physical watermarking-based detection of measurement replacement attacks in networked control systemsOptimal deception attacks on remote state estimators equipped with interval anomaly detectorsFinite-time covert attacks on reference tracking systems with unknown-but-bounded noisesZero-dynamics attack, variations, and countermeasuresCyber-physical systems subject to false data injections: a model predictive control framework for resilience operationsQuickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policyDesign of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanismFalse data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approachOptimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical dataSingle-dimensional encryption against innovation-based stealthy attacks on remote state estimationMalicious adversaries against secure state estimation: Sparse sensor attack design




This page was built for publication: Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack