Malicious adversaries against secure state estimation: Sparse sensor attack design
From MaRDI portal
Recommendations
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries
- False data injection attacks on sensors against state estimation in cyber-physical systems
- Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach
- Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks
Cites work
- scientific article; zbMATH DE number 6936864 (Why is no real title available?)
- Adaptive Reliable Coordination Control for Linear Agent Networks With Intermittent Communication Constraints
- An adaptive extraction of generalized eigensubspace by using exact nested orthogonal complement structure
- Attack Detection and Identification in Cyber-Physical Systems
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Attack-Resilient State Estimation for Noisy Dynamical Systems
- Cyber Physical Attacks with Control Objectives
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information
- Event-Triggered State Observers for Sparse Sensor Noise/Attacks
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Linear system security -- detection and correction of adversarial sensor attacks in the noise-free case
- Malicious Attacks on State Estimation Against Distributed Control Systems
- Minimum Sparsity of Unobservable Power Network Attacks
- On the Performance Analysis of Reset Attack in Cyber-Physical Systems
- Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
- Optimal Linear Cyber-Attack on Remote State Estimation
- Partial state observers for linear systems with unknown inputs
- Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks
- Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
- Secure trajectory planning against undetectable spoofing attacks
- State estimation under false data injection attacks: security analysis and system protection
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Worst-case stealthy innovation-based linear attack on remote state estimation
Cited in
(12)- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems
- Secure state estimation with disturbance rejection against switched sparse sensor attacks
- Hybrid-driven-based fuzzy secure filtering for nonlinear parabolic partial differential equation systems with cyber attacks
- Geometrical characterization of sensor placement for cone-invariant and multi-agent systems against undetectable zero-dynamics attacks
- Securing state reconstruction under sensor and actuator attacks: theory and design
- Fast state estimation under sensor attacks: a sensor categorization approach
- Efficient secure state estimation against sparse integrity attack for regular linear system
- Convex Optimization Based State Estimation Against Sparse Integrity Attacks
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Secure trajectory planning against undetectable spoofing attacks
- Security analysis for cyber-physical systems under undetectable attacks: a geometric approach
This page was built for publication: Malicious adversaries against secure state estimation: Sparse sensor attack design
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2063792)