Secure Estimation in the Presence of Integrity Attacks
From MaRDI portal
Publication:2982795
DOI10.1109/TAC.2014.2350231zbMath1360.68439OpenAlexW2112784437MaRDI QIDQ2982795
Publication date: 16 May 2017
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tac.2014.2350231
Estimation and detection in stochastic control theory (93E10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Related Items (16)
Secure estimation based Kalman filter for cyber-physical systems against sensor attacks ⋮ Performance guaranteed attack reconstruction for cyber-physical systems: a new intermediate estimator-based framework ⋮ Complex cyber-physical networks: from cybersecurity to security control ⋮ Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks ⋮ Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries ⋮ Byzantine-resilient distributed observers for LTI systems ⋮ Stealthy attacks formalized as STL formulas for Falsification of CPS Security ⋮ Optimal denial-of-service attack energy management against state estimation over an SINR-based network ⋮ Attack detection and secure state estimation for cyber-physical systems with finite-frequency observers ⋮ Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks ⋮ Attack detection/isolation via a secure multisensor fusion framework for cyberphysical systems ⋮ Distributed Krein space-based attack detection over sensor networks under deception attacks ⋮ Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels ⋮ A Structural Approach to State-to-Output Decoupling ⋮ The vulnerability of distributed state estimator under stealthy attacks ⋮ Resource-efficient and secure distributed state estimation over wireless sensor networks: a survey
This page was built for publication: Secure Estimation in the Presence of Integrity Attacks