Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
From MaRDI portal
Publication:2109274
DOI10.1007/S11424-022-1005-ZzbMATH Open1506.94045OpenAlexW4289517706MaRDI QIDQ2109274FDOQ2109274
Authors: Yanyan Li
Publication date: 20 December 2022
Published in: Journal of Systems Science and Complexity (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11424-022-1005-z
Recommendations
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Window-type detector for stealthy false data injection attack in cyber-physical systems
- Optimal stealthy false data injection attacks in cyber-physical systems
- Attacks detection and security control for cyber-physical systems under false data injection attacks
Communication theory (94A05) Cryptography (94A60) Stochastic systems in control theory (general) (93E03) Networked control (93B70)
Cites Work
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Optimal Linear Cyber-Attack on Remote State Estimation
- A novel networked predictive control method for systems with random communication constraints
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Optimal stealthy false data injection attacks in cyber-physical systems
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- Title not available (Why is that?)
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach
- Cyber Physical Attacks with Control Objectives
- Optimal switching integrity attacks on sensors in Industrial control systems
- Optimal Partial Feedback Attacks in Cyber-Physical Power Systems
Cited In (15)
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Window-type detector for stealthy false data injection attack in cyber-physical systems
- Composite anti-disturbance control of hidden semi-Markov jump systems via disturbance observer
- Finite-time fuzzy adaptive output feedback resilient control of nonlinear cyber-physical systems with sensor attacks and actuator faults
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Proactive attack detection scheme based on watermarking and moving target defense
- Security of networked control systems subject to deception attacks: a survey
- Optimal thresholds for anomaly-based intrusion detection in dynamical environments
- Network steganography based security framework for cyber-physical systems
- Detection-based resilient control for cyber-physical systems against two-channel false data injection attacks
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
- Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
This page was built for publication: Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2109274)