Network steganography based security framework for cyber-physical systems (Q6203495): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / cites work
 
Property / cites work: Q3993534 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Remote State Estimation in the Presence of an Active Eavesdropper / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Autocovariance Least-Squares Method for Noise Covariance Matrices Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Moving Target Defense for Securing Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case stealthy innovation-based linear attack on remote state estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Linear Cyber-Attack on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: State estimation under false data injection attacks: security analysis and system protection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5375255 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure / rank
 
Normal rank
Property / cites work
 
Property / cites work: State-Secrecy Codes for Networked Linear Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Denial-of-Service Attack Scheduling With Energy Constraint / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal sensor attacks in cyber-physical systems with round-robin protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 09:18, 29 August 2024

scientific article; zbMATH DE number 7825392
Language Label Description Also known as
English
Network steganography based security framework for cyber-physical systems
scientific article; zbMATH DE number 7825392

    Statements

    Network steganography based security framework for cyber-physical systems (English)
    0 references
    0 references
    0 references
    0 references
    27 March 2024
    0 references
    cyber-physical systems
    0 references
    network steganography
    0 references
    covert channel
    0 references
    attack detection
    0 references
    eavesdropping attack defense
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references