Medium access scheduling for input reconstruction under deception attacks
From MaRDI portal
Publication:2012091
Recommendations
- Input reconstruction for networked control systems subject to deception attacks and data losses on control signals
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks
- Recent advances on filtering and control for cyber-physical systems under security and resource constraints
- Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks
Cites work
- scientific article; zbMATH DE number 932455 (Why is no real title available?)
- A stochastic game approach to the security issue of networked control systems under jamming attacks
- Co-design of dynamic scheduling and quantized control for networked control systems
- Communication and control co-design for networked control systems
- Design of robust \(H\infty\) fault detection filter for uncertain time-delay systems using canonical form approach
- Fault diagnosis in a networked control system under communication constraints: a quadrotor application
- Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy - a survey and some new results
- Kalman Filter for Discrete-Time Stochastic Linear Systems Subject to Intermittent Unknown Inputs
- Optimal fault detection design via iterative estimation methods for industrial control systems
- Safe and Secure Networked Control Systems under Denial-of-Service Attacks
- Schedule and control co-design for networked control systems with bandwidth constraints
- Unbiased minimum variance estimation for systems with unknown exogenous inputs
Cited in
(5)- Input reconstruction for networked control systems subject to deception attacks and data losses on control signals
- Particle filtering for a class of cyber-physical systems under round-robin protocol subject to randomly occurring deception attacks
- \(H_\infty\) filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks
- Data-driven attacks and data recovery with noise on state estimation of smart grid
- Detection of replay attacks in cyber-physical systems using a frequency-based signature
This page was built for publication: Medium access scheduling for input reconstruction under deception attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2012091)