Pages that link to "Item:Q2005526"
From MaRDI portal
The following pages link to Optimal stealthy false data injection attacks in cyber-physical systems (Q2005526):
Displaying 23 items.
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems (Q826753) (← links)
- Sliding-mode secure control for jump cyber-physical systems with malicious attacks (Q2027392) (← links)
- Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems (Q2027448) (← links)
- Distributed active disturbance rejection control for Ackermann steering of a four-in-wheel motor drive vehicle with deception attacks on controller area networks (Q2053812) (← links)
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis (Q2055571) (← links)
- Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks (Q2056334) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme (Q2109274) (← links)
- Optimal deception attacks against remote state estimation in cyber-physical systems (Q2297415) (← links)
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems (Q2660860) (← links)
- Leader-following bipartite consensus of multiple uncertain Euler-Lagrange systems under deception attacks (Q2671858) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (Q6117503) (← links)
- Detection and defense of time‐varying formation for unmanned aerial vehicles against false data injection attacks and external disturbance (Q6117629) (← links)
- Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach (Q6122280) (← links)
- Adaptive sliding-mode tracking control of networked control systems with false data injection attacks (Q6149511) (← links)
- Leader‐following consensus of multiple uncertain Euler–Lagrange systems under denial‐of‐service attacks (Q6149729) (← links)
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems (Q6154461) (← links)
- Optimal attack strategy against fault detectors for linear cyber-physical systems (Q6180214) (← links)
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems (Q6199483) (← links)
- Privacy and security trade-off in cyber-physical systems: an information theory-based framework (Q6498553) (← links)