Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
From MaRDI portal
Publication:5358527
DOI10.1109/TCNS.2016.2573039zbMath1370.94562DBLPjournals/tcns/MiaoZPP17arXiv1605.08962OpenAlexW3106420340WikidataQ57581494 ScholiaQ57581494MaRDI QIDQ5358527
Miroslav Pajic, George J. Pappas, Fei Miao, Quanyan Zhu
Publication date: 21 September 2017
Published in: IEEE Transactions on Control of Network Systems (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1605.08962
Related Items (35)
Stochastic fault and cyber-attack detection and consensus control in multi-agent systems ⋮ Backstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurements ⋮ Sliding mode-based adaptive resilient control for Markovian jump cyber-physical systems in face of simultaneous actuator and sensor attacks ⋮ Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach ⋮ Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems ⋮ Static output feedback secure control for cyber‐physical systems based on multisensor scheme against replay attacks ⋮ Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach ⋮ Sparse attack reconstruction for cyber-physical systems via descriptor reduced-order observer ⋮ A safety preserving control architecture for cyber‐physical systems ⋮ An active approach for isolating replay attack from sensor faults ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach ⋮ A game-theoretic security framework for quantum cryptography: performance analysis and application ⋮ Cyber-physical systems subject to false data injections: a model predictive control framework for resilience operations ⋮ A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems ⋮ Secure formation control for resilient multi‐agent cyber‐physical systems under <scp>DoS</scp> attacks and faults ⋮ Tampering attack detection for remote interval observer ⋮ Secure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observer ⋮ Optimal completely stealthy attacks against remote estimation in cyber-physical systems ⋮ A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index ⋮ Performance degradation of stealthy attacks against sensor measurements in vector systems ⋮ Detection of actuator faults for continuous-time systems with intermittent state feedback ⋮ Stochastic coding detection scheme in cyber-physical systems against replay attack ⋮ Optimal stealthy false data injection attacks in cyber-physical systems ⋮ A stealthy man-in-the-middle attack strategy for switched systems ⋮ Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems ⋮ A hybrid stochastic game for secure control of cyber-physical systems ⋮ Secure pinning synchronization on aperiodic intermittent event-triggered control in discrete-time complex networks against multi-pattern link attacks ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ Optimal deception attacks against remote state estimation in cyber-physical systems ⋮ Stochastic encryption against stealthy attacks in CPSs: a zero-sum game approach ⋮ Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks ⋮ Observer-based backstepping control for nonlinear cyber-physical systems with incomplete measurements ⋮ A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
This page was built for publication: Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks