The Performance and Limitations of \epsilon- Stealthy Attacks on Higher Order Systems
From MaRDI portal
Publication:2989608
Cited in
(17)- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Man-in-the-middle attack against cyber-physical systems under random access protocol
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
- Two-channel false data injection attacks on multi-sensor remote state estimation
- Nonlinear stealthy attacks on remote state estimation
- Security of networked control systems subject to deception attacks: a survey
- Optimal attack strategy against fault detectors for linear cyber-physical systems
- Performance degradation of stealthy attacks against sensor measurements in vector systems
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Stealthy protocols: metrics and open problems
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information
- Performance based attack detection and security analysis for cyber‐physical systems
This page was built for publication: The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2989608)