Resilient strategy design for cyber-physical system under active eavesdropping attack
From MaRDI portal
Publication:2041382
DOI10.1016/j.jfranklin.2021.04.049zbMath1467.93143OpenAlexW3157217756MaRDI QIDQ2041382
Huanhuan Yuan, Yuan Yuan, Hongjiu Yang, Yuanqing Xia
Publication date: 19 July 2021
Published in: Journal of the Franklin Institute (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jfranklin.2021.04.049
2-person games (91A05) Applications of game theory (91A80) Control/observation systems involving computers (process control, etc.) (93C83) Stochastic games, stochastic differential games (91A15) Networked control (93B70)
Related Items (1)
Cites Work
- Unnamed Item
- A multi-channel transmission schedule for remote state estimation under DoS attacks
- Towards quantifying the impact of randomly occurred attacks on a class of networked control systems
- Detection against randomly occurring complex attacks on distributed state estimation
- Defensive deception against reactive jamming attacks in remote state estimation
- Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- A secure control mechanism for network environments
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Non-cooperative games
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach
- Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel
- 10.1162/1532443041827880
- Denial-of-Service Attacks on Communication Systems: Detectability and Jammer Knowledge
- Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
- Optimal Linear Cyber-Attack on Remote State Estimation
- Remote State Estimation in the Presence of an Active Eavesdropper
This page was built for publication: Resilient strategy design for cyber-physical system under active eavesdropping attack