Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

From MaRDI portal
Revision as of 00:15, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5358527

DOI10.1109/TCNS.2016.2573039zbMath1370.94562DBLPjournals/tcns/MiaoZPP17arXiv1605.08962OpenAlexW3106420340WikidataQ57581494 ScholiaQ57581494MaRDI QIDQ5358527

Miroslav Pajic, George J. Pappas, Fei Miao, Quanyan Zhu

Publication date: 21 September 2017

Published in: IEEE Transactions on Control of Network Systems (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1605.08962






Related Items (35)

Stochastic fault and cyber-attack detection and consensus control in multi-agent systemsBackstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurementsSliding mode-based adaptive resilient control for Markovian jump cyber-physical systems in face of simultaneous actuator and sensor attacksSecure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approachWorst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systemsStatic output feedback secure control for cyber‐physical systems based on multisensor scheme against replay attacksStealthy multiplicative attacks against cyber‐physical systems: A gap metric approachSparse attack reconstruction for cyber-physical systems via descriptor reduced-order observerA safety preserving control architecture for cyber‐physical systemsAn active approach for isolating replay attack from sensor faultsSecurity of networked control systems subject to deception attacks: a surveyOptimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approachA game-theoretic security framework for quantum cryptography: performance analysis and applicationCyber-physical systems subject to false data injections: a model predictive control framework for resilience operationsA dynamic encryption-decryption scheme for replay attack detection in cyber-physical systemsSecure formation control for resilient multi‐agent cyber‐physical systems under <scp>DoS</scp> attacks and faultsTampering attack detection for remote interval observerSecure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observerOptimal completely stealthy attacks against remote estimation in cyber-physical systemsA novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) indexPerformance degradation of stealthy attacks against sensor measurements in vector systemsDetection of actuator faults for continuous-time systems with intermittent state feedbackStochastic coding detection scheme in cyber-physical systems against replay attackOptimal stealthy false data injection attacks in cyber-physical systemsA stealthy man-in-the-middle attack strategy for switched systemsOptimal periodic watermarking schedule for replay attack detection in cyber-physical systemsA hybrid stochastic game for secure control of cyber-physical systemsSecure pinning synchronization on aperiodic intermittent event-triggered control in discrete-time complex networks against multi-pattern link attacksA secure strategy for a cyber physical system with multi-sensor under linear deception attackOptimal deception attacks against remote state estimation in cyber-physical systemsStochastic encryption against stealthy attacks in CPSs: a zero-sum game approachDistributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacksObserver-based backstepping control for nonlinear cyber-physical systems with incomplete measurementsA stealthy artificial noise strategy against eavesdropping for remote estimation sensor networksDetection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme







This page was built for publication: Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks