Pages that link to "Item:Q2288700"
From MaRDI portal
The following pages link to Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems (Q2288700):
Displaying 19 items.
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems (Q826753) (← links)
- Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems (Q2027448) (← links)
- Resilient strategy design for cyber-physical system under active eavesdropping attack (Q2041382) (← links)
- A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer (Q2059497) (← links)
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (Q2063783) (← links)
- System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy (Q2082774) (← links)
- Input-to-state stability of switched linear systems with unstabilizable modes under DoS attacks (Q2097769) (← links)
- Geometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics Attacks (Q5071033) (← links)
- Event-based leader-follower consensus of nonlinear multi-agent systems under denial-of-service (Q6052185) (← links)
- K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks (Q6085136) (← links)
- Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems (Q6085138) (← links)
- Static output-feedback control for cyber-physical LPV systems under DoS attacks (Q6086263) (← links)
- Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems (Q6099932) (← links)
- Optimal stealthy attack with historical data on cyber-physical systems (Q6109035) (← links)
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (Q6117503) (← links)
- Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises (Q6144134) (← links)
- A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems (Q6164035) (← links)
- Quickest detection of deception attacks on cyber-physical systems with a parsimonious watermarking policy (Q6165320) (← links)
- Robust secure synchronization control for multiple neural networks: An event‐triggered adaptive integral sliding mode method (Q6180521) (← links)