Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
From MaRDI portal
Publication:6562327
DOI10.1016/J.INS.2024.120859zbMATH Open1544.93782MaRDI QIDQ6562327
Publication date: 26 June 2024
Published in: Information Sciences (Search for Journal in Brave)
Linear programming (90C05) Control/observation systems involving computers (process control, etc.) (93C83) Estimation and detection in stochastic control theory (93E10) Linear systems in control theory (93C05) Networked control (93B70)
Cites Work
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Representations of the Drazin inverse for a class of block matrices
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Optimal stealthy false data injection attacks in cyber-physical systems
- A novel approach to \(H_\infty\) performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Event-triggered control for stochastic networked control systems against denial-of-service attacks
- On model‐based detectors for linear time‐invariant stochastic systems under sensor attacks
- Eigenvalue Inequalities for Matrix Product
- Optimal Allocation of False Data Injection Attacks for Networked Control Systems With Two Communication Channels
- Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence
- Optimal stealthy attack with historical data on cyber-physical systems
- Event triggered control of connected vehicles under multiple cyber attacks
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- Event-triggered reference governors for collisions-free leader-following coordination under unreliable communication topologies
This page was built for publication: Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6562327)