Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (Q2063783): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Import241208061232 (talk | contribs)
Normalize DOI.
 
(5 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.automatica.2021.110015 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.automatica.2021.110015 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3217004556 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q121975436 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3993534 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Against False Data-Injection Attack in Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Event-Based Stealthy Attack on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Remote State Estimation in the Presence of an Active Eavesdropper / rank
 
Normal rank
Property / cites work
 
Property / cites work: Defensive deception against reactive jamming attacks in remote state estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Linear Cyber-Attack on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case stealthy innovation-based linear attack on remote state estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: State estimation under false data injection attacks: security analysis and system protection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Online Approach to Physical Watermark Design / rank
 
Normal rank
Property / cites work
 
Property / cites work: Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Attack Energy Allocation against Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure State Estimation With Byzantine Sensors: A Probabilistic Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Vulnerability of Cyber-Physical System Under Stealthy Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: State-Secrecy Codes for Networked Linear Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed filtering under false data injection attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Denial-of-Service Attack Scheduling With Energy Constraint / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resilient Distributed Optimization Algorithm Against Adversarial Attacks / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.AUTOMATICA.2021.110015 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 22:29, 16 December 2024

scientific article
Language Label Description Also known as
English
Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
scientific article

    Statements

    Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    3 January 2022
    0 references
    cyber-physical security
    0 references
    single-dimensional encryption
    0 references
    stealthy attacks
    0 references
    remote state estimation
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references