Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
From MaRDI portal
Publication:2224736
DOI10.1016/j.jfranklin.2019.02.010zbMath1455.93075OpenAlexW2915088582MaRDI QIDQ2224736
Weiwei Tu, Ding Zhai, Jiuxiang Dong
Publication date: 4 February 2021
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2019.02.010
Control/observation systems involving computers (process control, etc.) (93C83) Discrete-time control/observation systems (93C55) Linear systems in control theory (93C05) Networked control (93B70)
Related Items (2)
Design of false data injection attacks in cyber-physical systems ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems
Cites Work
- Unnamed Item
- Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
- Improved adaptive resilient control against sensor and actuator attacks
- A stochastic game approach to the security issue of networked control systems under jamming attacks
- A data-driven covert attack strategy in the closed-loop cyber-physical systems
- Optimal jamming attack schedule for remote state estimation with two sensors
- A secure control framework for resource-limited adversaries
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Adaptive optimisation-offline cyber attack on remote state estimator
- Optimal Attack Energy Allocation against Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
This page was built for publication: Optimal \(\epsilon\)-stealthy attack in cyber-physical systems