Synthesis of covert actuator attackers for free
From MaRDI portal
Publication:2220340
DOI10.1007/s10626-020-00312-2zbMath1458.93073arXiv1904.10159OpenAlexW3021960365MaRDI QIDQ2220340
Liyong Lin, Rong Su, Yu-Ting Zhu
Publication date: 22 January 2021
Published in: Discrete Event Dynamic Systems (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1904.10159
Control/observation systems involving computers (process control, etc.) (93C83) Discrete event control/observation systems (93C65) Synthesis problems (93B50) Networked control (93B70)
Related Items
Discrete-event systems subject to unknown sensor attacks, Networked supervisor synthesis against lossy channels with bounded network delays as non-networked synthesis, Synthesis of covert actuator and sensor attackers, Robust corrective control against fundamental and non-fundamental mode attacks with application to an asynchronous digital system, Synthesis of optimal covert sensor-actuator attackers for discrete-event systems, On decidability of existence of nonblocking supervisors resilient to smart sensor attacks, Observation-assisted heuristic synthesis of covert attackers against unknown supervisors, Robust input/output model matching of asynchronous sequential machines under intermittent actuator faults, Synthesis of winning attacks on communication protocols using supervisory control theory: two case studies
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Games for synthesis of controllers with partial observation.
- Detection and mitigation of classes of attacks in supervisory control systems
- Supervisory control of discrete-event systems
- Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
- Supervisory control of discrete-event systems under attacks
- Synthesis of Maximally Permissive Supervisors for Partially-Observed Discrete-Event Systems
- Stealthy deception attacks on water SCADA systems
- Quantitative Multi-objective Verification for Probabilistic Systems
- A unified approach to control problems in discrete event processes
- Attack Detection and Identification in Cyber-Physical Systems
- On the computation of natural observers in discrete-event systems