A data-driven covert attack strategy in the closed-loop cyber-physical systems
From MaRDI portal
Recommendations
- Optimal stealthy false data injection attacks in cyber-physical systems
- Cooperative attack strategy design via H−/H∞ scheme for linear cyber‐physical systems
- Optimal stealthy attack with historical data on cyber-physical systems
- False data injection attacks on sensors against state estimation in cyber-physical systems
- Data-based optimal denial-of-service attack scheduling against robust control based on Q-learning
Cites work
- scientific article; zbMATH DE number 3997615 (Why is no real title available?)
- A secure control framework for resource-limited adversaries
- Analytical approximation of open-channel flow for controller design
- Attack Detection and Identification in Cyber-Physical Systems
- Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
- Identifying MIMO Wiener systems using subspace model identification methods
- On the Relation Between CCA and Predictor-Based Subspace Identification
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer
- State estimation under false data injection attacks: security analysis and system protection
- Subspace identification of multivariable linear parameter-varying systems
Cited in
(7)- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
- Data-driven attack policy design for cyber-physical systems under channel constraints
- Masking attack for sampled-data systems via input redundancy
- Security of networked control systems subject to deception attacks: a survey
- A multiplicative coordinated stealthy attack for nonlinear cyber-physical systems with homogeneous property
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack
- Event-triggered secure control of positive networked control systems under multi-channels attacks
This page was built for publication: A data-driven covert attack strategy in the closed-loop cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1796672)