Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
From MaRDI portal
Publication:3384351
DOI10.1109/MCS.2014.2364725zbMath1476.93096OpenAlexW2016617706MaRDI QIDQ3384351
Fabio Pasqualetti, Bullo, Francesco, Florian Dörfler
Publication date: 15 December 2021
Published in: IEEE Control Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/mcs.2014.2364725
Related Items (30)
Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach ⋮ A nonlinear systems framework for cyberattack prevention for chemical process control systems ⋮ Adaptive finite-time control for cyber-physical systems with injection and deception attacks ⋮ Adaptive dual-layer super-twisting sliding mode observers to reconstruct and mitigate disturbances and communication attacks in power networks ⋮ Byzantine-resilient distributed state estimation: a min-switching approach ⋮ Data-injection attacks in stochastic control systems: detectability and performance tradeoffs ⋮ Resilience to denial-of-service and integrity attacks: a structured systems approach ⋮ Resilient control of cyber‐physical systems under sensor and actuator attacks driven by adaptive sliding mode observer ⋮ Distributed infinite‐horizon optimal control of continuous‐time linear systems over network ⋮ Estimating pollution spread in water networks as a Schrödinger bridge problem with partial information ⋮ Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems ⋮ Differential initial-value privacy and observability of linear dynamical systems ⋮ Output-sensitive event-triggered path following control of autonomous ground vehicles under stochastic FDI attacks ⋮ Optimal resilient sensor placement problem for secure state estimation ⋮ Adaptive dynamic programming for security of networked control systems with actuator saturation ⋮ Neural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal ⋮ Detection and mitigation of biasing attacks on distributed estimation networks ⋮ A secure control mechanism for network environments ⋮ Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System ⋮ Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks ⋮ Cyber attack estimation and detection for cyber-physical power systems ⋮ Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution ⋮ Security-based resilient event-triggered control of networked control systems under denial of service attacks ⋮ A data-driven covert attack strategy in the closed-loop cyber-physical systems ⋮ Cyber-attacks and faults reconstruction using finite time convergent observation algorithms: electric power network application ⋮ Resilient synchronization of distributed multi-agent systems under attacks ⋮ Unknown source in spatially distributed systems: identifiability analysis and estimation ⋮ Usability aware secret protection with minimum cost ⋮ Incentive-based fault tolerant control of evolutionary matrix games ⋮ Dynamic model predictive control for constrained cyber-physical systems subject to actuator attacks
This page was built for publication: Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems