The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
From MaRDI portal
Publication:2989608
DOI10.1109/TAC.2016.2565379zbMath1364.93806MaRDI QIDQ2989608
Subhrakanti Dey, Ling Shi, Enoch Kung
Publication date: 8 June 2017
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Filtering in stochastic control theory (93E11) Data encryption (aspects in computer science) (68P25)
Related Items (14)
Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems ⋮ Data-injection attacks in stochastic control systems: detectability and performance tradeoffs ⋮ Man-in-the-middle attack against cyber-physical systems under random access protocol ⋮ Vulnerability analysis of distributed state estimation under joint deception attacks ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Optimal deception attacks on remote state estimators equipped with interval anomaly detectors ⋮ Optimal attack strategy against fault detectors for linear cyber-physical systems ⋮ Performance based attack detection and security analysis for cyber‐physical systems ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Optimal \(\epsilon\)-stealthy attack in cyber-physical systems ⋮ Performance degradation of stealthy attacks against sensor measurements in vector systems ⋮ SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
This page was built for publication: The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems