Stealthy protocols: metrics and open problems
From MaRDI portal
Publication:1708705
DOI10.1007/978-3-319-51046-0_1zbMATH Open1487.94009OpenAlexW2564278573MaRDI QIDQ1708705FDOQ1708705
Authors: Olga Chen, Gautam Trivedi, Catherine Meadows
Publication date: 26 March 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-51046-0_1
Recommendations
- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
- Security against covert adversaries: Efficient protocols for realistic adversaries
- Stealthy attacks and attack-resilient interval observers
- Network-Hiding Communication and Applications to Multi-party Protocols
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
Cited In (2)
This page was built for publication: Stealthy protocols: metrics and open problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1708705)