Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach
From MaRDI portal
Publication:6122280
DOI10.1016/j.ins.2022.08.025OpenAlexW4292336668WikidataQ114848365 ScholiaQ114848365MaRDI QIDQ6122280
Publication date: 27 March 2024
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2022.08.025
energy constraintscyber-physical systemsstealthy attacksoptimal encryption strategyStackelberg game analysis
Hierarchical games (including Stackelberg games) (91A65) Cryptography (94A60) Experimental studies (91A90)
Cites Work
- State estimation under false data injection attacks: security analysis and system protection
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Game theoretic approach to shadowed sets: a three-way tradeoff perspective
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Optimal stealthy false data injection attacks in cyber-physical systems
- Event-triggered predictive control for networked control systems with DoS attacks
- Optimizing vehicle routing via Stackelberg game framework and distributionally robust equilibrium optimization method
- Game theoretical security detection strategy for networked systems
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- Hierarchical optimal control for input-affine nonlinear systems through the formulation of Stackelberg game
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
This page was built for publication: Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach