Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies (Q2106413): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: GitHub / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: UMDES / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3198395630 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 2102.06028 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5322945 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formulas for calculating supremal controllable and normal sublanguages / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection and mitigation of classes of attacks in supervisory control systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Introduction to Discrete Event Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On supremal languages of classes of sublanguages that arise in supervisor synthesis problems with partial observation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Supervisory control and reactive synthesis: a comparative introduction / rank
 
Normal rank
Property / cites work
 
Property / cites work: A discrete event systems approach for protocol conversion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synthesis of covert actuator attackers for free / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synthesis of Supervisors Robust Against Sensor Deception Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Supervisory control of discrete-event systems under attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Supervisory control of discrete-event systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Synthesis of Maximally Permissive Supervisors for Partially-Observed Discrete-Event Systems / rank
 
Normal rank

Latest revision as of 02:50, 31 July 2024

scientific article
Language Label Description Also known as
English
Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies
scientific article

    Statements

    Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies (English)
    0 references
    0 references
    0 references
    14 December 2022
    0 references
    distributed protocols
    0 references
    person-in-the-middle attacks
    0 references
    supervisory control
    0 references
    alternating bit protocol
    0 references
    transmission control protocol
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references