Command-governor-based stealthy attack design for estimation difference regulation
From MaRDI portal
Publication:6659237
DOI10.1016/j.automatica.2024.111951MaRDI QIDQ6659237
Lei Wang, Tao Chen, Hongye Su, Zhitao Liu
Publication date: 8 January 2025
Published in: Automatica (Search for Journal in Brave)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- State estimation under false data injection attacks: security analysis and system protection
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Reference and command governors for systems with constraints: A survey on theory and applications
- Robust command governors for constrained linear systems
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Linear systems with state and control constraints: the theory and application of maximal output admissible sets
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- Linear Models in Statistics
This page was built for publication: Command-governor-based stealthy attack design for estimation difference regulation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6659237)