Defensive deception against reactive jamming attacks in remote state estimation
From MaRDI portal
Recommendations
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis
- Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
- Adaptive optimisation-offline cyber attack on remote state estimator
Cites work
- scientific article; zbMATH DE number 6936864 (Why is no real title available?)
- scientific article; zbMATH DE number 3274494 (Why is no real title available?)
- 10.1162/1532443041827880
- A Stackelberg game and Markov modeling of moving target defense
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Continuous stochastic games
- Dynamic sensor transmission power scheduling for remote state estimation
- Fundamentals of Wireless Communication
- Game theory
- Game-theoretic approach to feedback-driven multi-stage moving target defense
- Games and dynamic games
- Input-to-State Stabilizing Control Under Denial-of-Service
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Optimal LQG control across packet-dropping links
- Recursive lexicographical search: finding all Markov perfect equilibria of finite state directional dynamic games
- Resilient control under denial-of-service: robust design
- Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies
- Wired/Wireless Internet Communications
Cited in
(10)- The noise covariances of linear Gaussian systems with unknown inputs are not uniquely identifiable using autocovariance least-squares
- Stackelberg game for secure estimation of linear systems subject to unknown input and smart jamming
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Rollout approach to sensor scheduling for remote state estimation under integrity attack
- Optimal Deception Attacks Against Remote State Estimation: An Information-Based Approach
- Resilient strategy design for cyber-physical system under active eavesdropping attack
- Deceptive routing in relay networks
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- A survey: when moving target defense meets game theory
- Subsystem-importance-aware DoS attacks and countermeasures
This page was built for publication: Defensive deception against reactive jamming attacks in remote state estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2173899)