Man-in-the-middle attack against cyber-physical systems under random access protocol (Q6066143): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2021.07.083 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3187445324 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3993534 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resilient and secure remote monitoring for a class of cyber-physical systems against attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed Krein space-based attack detection over sensor networks under deception attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Linear Cyber-Attack on Remote State Estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case stealthy innovation-based linear attack on remote state estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: State estimation under false data injection attacks: security analysis and system protection / rank
 
Normal rank
Property / cites work
 
Property / cites work: Observer-based event triggering \(H_\infty\) LFC for multi-area power systems under DoS attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure state estimation for systems under mixed cyber-attacks: security and performance analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: On convexification of system identification criteria / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive control for nonlinear cyber‐physical systems under false data injection attacks through sensor networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Attack-Resilient Pulse-Based Synchronization Strategy for General Connected Topologies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Global pinning synchronization of stochastic delayed complex networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sampled-position states based consensus of networked multi-agent systems with second-order dynamics subject to communication delays / rank
 
Normal rank
Property / cites work
 
Property / cites work: Observer-based adaptive event-triggered sliding mode control of saturated nonlinear networked systems with cyber-attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal sensor attacks in cyber-physical systems with round-robin protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Set-membership filtering for time-varying systems with mixed time-delays under round-robin and weighted try-once-discard protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Moving Horizon Estimation for Networked Time-Delay Systems Under Round-Robin Protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Recursive Filtering for Time-Varying Systems with Random Access Protocol / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 11:35, 21 August 2024

scientific article; zbMATH DE number 7775805
Language Label Description Also known as
English
Man-in-the-middle attack against cyber-physical systems under random access protocol
scientific article; zbMATH DE number 7775805

    Statements

    Man-in-the-middle attack against cyber-physical systems under random access protocol (English)
    0 references
    0 references
    0 references
    0 references
    12 December 2023
    0 references
    cyber-physical systems
    0 references
    man-in-the-middle attack
    0 references
    Kalman filter
    0 references
    Kullback-Leibler divergence
    0 references
    linear quadratic Gaussian
    0 references
    random access protocol
    0 references
    0 references

    Identifiers