Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: an input design approach
From MaRDI portal
Publication:6643186
DOI10.1016/J.NAHS.2024.101529MaRDI QIDQ6643186
Author name not available (Why is that?), Jin Guo, Yan Liu, Peng Yu
Publication date: 26 November 2024
Published in: Nonlinear Analysis. Hybrid Systems (Search for Journal in Brave)
System identification (93B30) Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70) Impulsive control/observation systems (93C27)
Cites Work
- Identification of Wiener systems with quantized inputs and binary-valued output observations
- Robust decentralized diagnosability of networked discrete event systems against DoS and deception attacks
- Theory of probability and random processes.
- System Identification With Binary-Valued Observations Under Data Tampering Attacks
- Quantized Identification With Dependent Noise and Fisher Information Ratio of Communication Channels
- A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
- Stealthy Local Covert Attacks on Cyber-Physical Systems
- A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack
- Prescribed-time adaptive output feedback tracking control for nonlinear systems with quantized input
- Sparse attack reconstruction for cyber-physical systems via descriptor reduced-order observer
- Asymptotic consensus of multi-agent systems under binary-valued observations and observation uncertainty
- Performance analysis for cyber-physical systems under two types of stealthy deception attacks
This page was built for publication: Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: an input design approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6643186)