Pages that link to "Item:Q4630139"
From MaRDI portal
The following pages link to Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems (Q4630139):
Displaying 10 items.
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking (Q2003830) (← links)
- Malicious adversaries against secure state estimation: Sparse sensor attack design (Q2063792) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- Stealthy attacks and attack-resilient interval observers (Q2097713) (← links)
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs (Q2409156) (← links)
- On a security vs privacy trade-off in interconnected dynamical systems (Q2663923) (← links)
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints (Q6117503) (← links)
- Performance analysis for cyber-physical systems under two types of stealthy deception attacks (Q6152568) (← links)
- Optimal attack strategy against fault detectors for linear cyber-physical systems (Q6180214) (← links)
- Secure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observer (Q6194720) (← links)