Security of networked control systems subject to deception attacks: a survey
From MaRDI portal
Publication:6099319
DOI10.1080/00207721.2022.2143735zbMath1518.93051MaRDI QIDQ6099319
Unnamed Author, Guo Ping Liu, Haibin Guo, Runqi Chai, Jian Sun, Yuntao Shi, Zhonghua Pang
Publication date: 19 June 2023
Published in: International Journal of Systems Science (Search for Journal in Brave)
Related Items
Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint, State estimation for 2-D uncertain systems with redundant channels and deception attacks: a set-membership method, Two networked predictive control methods for output tracking of networked systems with plant-model mismatch, Resilient and event-triggered control of singular Markov jump systems against cyber attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Recent advances on filtering and control for cyber-physical systems under security and resource constraints
- State estimation under false data injection attacks: security analysis and system protection
- Improved adaptive resilient control against sensor and actuator attacks
- Non-fragile consensus control for nonlinear multi-agent systems with uniform quantizations and deception attacks via output feedback approach
- Network-based robust \(H_{\infty}\) control of systems with uncertainty
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Network-based modelling and dynamic output feedback control for unmanned marine vehicles in network environments
- Distributed filtering under false data injection attacks
- A data-driven covert attack strategy in the closed-loop cyber-physical systems
- Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Optimal stealthy false data injection attacks in cyber-physical systems
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks
- Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
- A novel approach to \(H_\infty\) performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Secure and collision-free multi-platoon control of automated vehicles under data falsification attacks
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- Performance degradation of stealthy attacks against sensor measurements in vector systems
- A novel networked predictive control method for systems with random communication constraints
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Secure distributed Kalman filter using partially homomorphic encryption
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
- On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks
- Networked control of microgrid system of systems
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks
- Distributed Bayesian Detection in the Presence of Byzantine Data
- Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Optimal Attack Energy Allocation against Remote State Estimation
- Cloud-Based Quadratic Optimization With Partially Homomorphic Encryption
- Resilient control of networked control systems under deception attacks: A memory‐event‐triggered communication scheme
- The safety region-based model predictive control for discrete-time systems under deception attacks
- Recent advances in event-triggered security control of networked systems: a survey
- Distributed Observer-Based Cooperative Control Approach for Uncertain Nonlinear MASs Under Event-Triggered Communication
- An Online Approach to Physical Watermark Design
- Optimal Partial Feedback Attacks in Cyber-Physical Power Systems
- Stealthy Actuator Signal Attacks in Stochastic Control Systems: Performance and Limitations
- On the Performance Analysis of Reset Attack in Cyber-Physical Systems
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Data‐based optimal Denial‐of‐Service attack scheduling against robust control based on Q‐learning
- Optimal Linear Cyber-Attack on Remote State Estimation
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- Minimum Sparsity of Unobservable Power Network Attacks
- Cyber Physical Attacks with Control Objectives
- An Event-Based Stealthy Attack on Remote State Estimation
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- Optimal Allocation of False Data Injection Attacks for Networked Control Systems With Two Communication Channels
- Stealthy Local Covert Attacks on Cyber-Physical Systems
- Sequential Detection of Replay Attacks
- Man-in-the-middle attack against cyber-physical systems under random access protocol
- False Data Injection Attacks Against State Estimation Without Knowledge of Estimators
- Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence
- Design of Stealthy Deception Attacks With Partial System Knowledge
- Control and communication scheduling co-design for networked control systems: a survey
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems