Secure remote state estimation against linear man-in-the-middle attacks using watermarking (Q2003830): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.automatica.2020.109182 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.automatica.2020.109182 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3048112693 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3993534 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A multi-channel transmission schedule for remote state estimation under DoS attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Linear Cyber-Attack on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3160322 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4003879 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Attack Energy Allocation against Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5375255 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cyberphysical Security in Networked Control Systems: An Introduction to the Issue / rank
 
Normal rank
Property / cites work
 
Property / cites work: Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: A survey of design methods for failure detection in dynamic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Denial-of-Service Attack Scheduling With Energy Constraint / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.AUTOMATICA.2020.109182 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 17:57, 16 December 2024

scientific article
Language Label Description Also known as
English
Secure remote state estimation against linear man-in-the-middle attacks using watermarking
scientific article

    Statements

    Secure remote state estimation against linear man-in-the-middle attacks using watermarking (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    5 October 2020
    0 references
    cyber-physical systems
    0 references
    cyber security
    0 references
    man-in-the-middle attack
    0 references
    remote state estimation
    0 references
    watermarking
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references