A data-driven covert attack strategy in the closed-loop cyber-physical systems
From MaRDI portal
Publication:1796672
DOI10.1016/j.jfranklin.2018.05.046zbMath1398.93072OpenAlexW2811110162WikidataQ129643857 ScholiaQ129643857MaRDI QIDQ1796672
Publication date: 17 October 2018
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2018.05.046
Feedback control (93B52) System identification (93B30) Identification in stochastic control theory (93E12) Realizations from input-output data (93B15) Large-scale systems (93A15)
Related Items
Security of networked control systems subject to deception attacks: a survey ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ A secure strategy for a cyber physical system with multi-sensor under linear deception attack ⋮ A multiplicative coordinated stealthy attack for nonlinear cyber-physical systems with homogeneous property
Cites Work
- Unnamed Item
- Identifying MIMO Wiener systems using subspace model identification methods
- State estimation under false data injection attacks: security analysis and system protection
- Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer
- Subspace identification of multivariable linear parameter-varying systems
- Analytical approximation of open-channel flow for controller design
- A secure control framework for resource-limited adversaries
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
- On the Relation Between CCA and Predictor-Based Subspace Identification
- Attack Detection and Identification in Cyber-Physical Systems