Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (Q6117503): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Optimal denial-of-service attack energy management against state estimation over an SINR-based network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stochastic coding detection scheme in cyber-physical systems against replay attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case stealthy innovation-based linear attack on remote state estimation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal stealthy false data injection attacks in cyber-physical systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation / rank
 
Normal rank

Latest revision as of 13:51, 28 August 2024

scientific article; zbMATH DE number 7821128
Language Label Description Also known as
English
Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints
scientific article; zbMATH DE number 7821128

    Statements

    Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    20 March 2024
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    attack resource constraints
    0 references
    cyber-physical systems
    0 references
    deception attacks
    0 references
    state estimation
    0 references