Stealthy deception attacks on water SCADA systems
DOI10.1145/1755952.1755976zbMATH Open1360.93315OpenAlexW4298286346MaRDI QIDQ2985877FDOQ2985877
Saurabh Amin, Alexandre Bayen, Xavier Litrico, S. Shankar Sastry
Publication date: 10 May 2017
Published in: Proceedings of the 13th ACM international conference on Hybrid systems: computation and control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1755952.1755976
Recommendations
- Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks
- Stealthy output injection attacks on control systems with bounded variables
- Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems
- Detection and mitigation of classes of attacks in supervisory control systems
- Dealing with sensor and actuator deception attacks in supervisory control
Hierarchical systems (93A13) Control/observation systems governed by partial differential equations (93C20) Automated systems (robots, etc.) in control theory (93C85) Adaptive or robust stabilization (93D21) Water waves, gravity waves; dispersion and scattering, nonlinear interaction (76B15)
Cites Work
- What's decidable about hybrid automata?
- Partial-order methods for the verification of concurrent systems. An approach to the state-explosion problem
- Title not available (Why is that?)
- Marked directed graphs
- Stability Analysis of Networked Control Systems Using a Switched Linear Systems Approach
- Unfoldings: A partial-order approach to model checking.
- Discrete-time control for rectangular hybrid automata
- Title not available (Why is that?)
- Decentralized Control of Discrete-Event Systems With Bounded or Unbounded Delay Communication
- Hybrid Systems: Computation and Control
- Hybrid Systems: Computation and Control
Cited In (11)
- A game-theoretic method for cross-layer stochastic resilient control design in CPS
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Regret bounds for online-learning-based linear quadratic control under database attacks
- A secure control framework for resource-limited adversaries
- Antagonistic control
- Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks
- Resilient decentralized sampled-data \(H_\infty\) filter design for linear interconnected systems subject to denial-of-service attacks
- Towards quantifying the impact of randomly occurred attacks on a class of networked control systems
- On the computational complexity of the secure state-reconstruction problem
- Synthesis of covert actuator attackers for free
- A safety preserving control architecture for cyber‐physical systems
This page was built for publication: Stealthy deception attacks on water SCADA systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2985877)