Security of interdependent and identical networked control systems
From MaRDI portal
Publication:1939623
DOI10.1016/j.automatica.2012.09.007zbMath1257.93012OpenAlexW1998960699MaRDI QIDQ1939623
Saurabh Amin, Galina A. Schwartz, Shankar S. Sastry
Publication date: 4 March 2013
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2012.09.007
Noncooperative games (91A10) Communication networks in operations research (90B18) Stochastic systems in control theory (general) (93E03) Large-scale systems (93A15) Authentication, digital signatures and secret sharing (94A62)
Related Items (35)
Adaptive finite-time control for cyber-physical systems with injection and deception attacks ⋮ Security in \(H_2\)-sense for polytopic uncertain systems with attacks based on model predictive control ⋮ Recent advances on filtering and control for cyber-physical systems under security and resource constraints ⋮ Fuzzy-logic-based control, filtering, and fault detection for networked systems: a survey ⋮ Improved distributed event-triggered control for networked control system under random cyberattacks via Bessel-Legendre inequalities ⋮ Non-fragile hybrid-triggered control of networked positive switched systems with cyber attacks ⋮ Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks ⋮ Vulnerability analysis of distributed state estimation under joint deception attacks ⋮ Secure sliding mode control of interval type‐2 fuzzy systems against intermittent denial‐of‐service attacks ⋮ Composite control of linear quadratic games in delta domain with disturbance observers ⋮ Game theoretical security detection strategy for networked systems ⋮ Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks ⋮ A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems ⋮ Adaptive dynamic programming for security of networked control systems with actuator saturation ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Event-triggered control of cyber-physical systems under asynchronous denial of service attacks ⋮ Sliding mode control for discrete-time systems with randomly occurring uncertainties and nonlinearities under hybrid cyber attacks ⋮ Strategic sensor placement on graphs ⋮ Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks ⋮ \(H_\infty\) filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks ⋮ Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks ⋮ Bayesian adversarial multi-node bandit for optimal smart grid protection against cyber attacks ⋮ Event-triggered sliding mode control of uncertain switched systems under denial-of-service attacks ⋮ Antagonistic control ⋮ Securing infrastructure facilities: when does proactive defense help? ⋮ Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks ⋮ On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks ⋮ Nash equilibrium seeking in quadratic noncooperative games under two delayed information-sharing schemes ⋮ Event-triggered \(H_\infty\) control of networked switched systems subject to denial-of-service attacks ⋮ MPC-based defense strategy for distributed networked control systems under DoS attacks ⋮ Non-fragile consensus control for nonlinear multi-agent systems with uniform quantizations and deception attacks via output feedback approach ⋮ A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks ⋮ A game-theoretic method for resilient control design in industrial multi-agent CPSs with Markovian and coupled dynamics ⋮ Voluntary defense strategy and quantized sample-data control for T-S fuzzy networked control systems with stochastic cyber-attacks and its application ⋮ Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks
This page was built for publication: Security of interdependent and identical networked control systems