Pages that link to "Item:Q1640242"
From MaRDI portal
The following pages link to Worst-case stealthy innovation-based linear attack on remote state estimation (Q1640242):
Displaying 43 items.
- Stochastic coding detection scheme in cyber-physical systems against replay attack (Q2005521) (← links)
- Optimal stealthy false data injection attacks in cyber-physical systems (Q2005526) (← links)
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data (Q2021302) (← links)
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack (Q2047102) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (Q2063783) (← links)
- Malicious adversaries against secure state estimation: Sparse sensor attack design (Q2063792) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- Optimal linear attack for multi-sensor network against state estimation (Q2095002) (← links)
- Fuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantization (Q2096295) (← links)
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme (Q2109274) (← links)
- Network theoretic analysis of maximum a posteriori detectors for optimal input detection (Q2139387) (← links)
- A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks (Q2180720) (← links)
- An encoding mechanism for secrecy of remote state estimation (Q2203054) (← links)
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach (Q2203055) (← links)
- A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index (Q2224724) (← links)
- Performance degradation of stealthy attacks against sensor measurements in vector systems (Q2224744) (← links)
- Attack and estimator design for multi-sensor systems with undetectable adversary (Q2280939) (← links)
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems (Q2288700) (← links)
- Optimal deception attacks against remote state estimation in cyber-physical systems (Q2297415) (← links)
- Resilient synchronization of distributed multi-agent systems under attacks (Q2307557) (← links)
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems (Q2660860) (← links)
- On the confidentiality of controller states under sensor attacks (Q2662292) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- Man-in-the-middle attack against cyber-physical systems under random access protocol (Q6066143) (← links)
- Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach (Q6069272) (← links)
- Vulnerability analysis of distributed state estimation under joint deception attacks (Q6073113) (← links)
- Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems (Q6085138) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Optimal stealthy attack with historical data on cyber-physical systems (Q6109035) (← links)
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (Q6117503) (← links)
- Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach (Q6122280) (← links)
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems (Q6154461) (← links)
- Innovation-based stealthy attack against distributed state estimation over sensor networks (Q6160767) (← links)
- Integrity attacks on remote estimation with spatial-temporal information sources (Q6165348) (← links)
- Optimal attack strategy against fault detectors for linear cyber-physical systems (Q6180214) (← links)
- Performance based attack detection and security analysis for cyber‐physical systems (Q6190354) (← links)
- Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels (Q6190376) (← links)
- Robust adaptive control for nonlinear cyber‐physical systems with FDI attacks via attack estimation (Q6194771) (← links)
- Design of false data injection attacks in cyber-physical systems (Q6195444) (← links)
- Design of strictly stealthy attacks for nonlinear multiagent systems under distributed attack detection mechanism (Q6196485) (← links)
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems (Q6199483) (← links)
- Network steganography based security framework for cyber-physical systems (Q6203495) (← links)