Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems

From MaRDI portal
Publication:3384351

DOI10.1109/MCS.2014.2364725zbMath1476.93096OpenAlexW2016617706MaRDI QIDQ3384351

Fabio Pasqualetti, Bullo, Francesco, Florian Dörfler

Publication date: 15 December 2021

Published in: IEEE Control Systems (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/mcs.2014.2364725




Related Items (30)

Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approachA nonlinear systems framework for cyberattack prevention for chemical process control systemsAdaptive finite-time control for cyber-physical systems with injection and deception attacksAdaptive dual-layer super-twisting sliding mode observers to reconstruct and mitigate disturbances and communication attacks in power networksByzantine-resilient distributed state estimation: a min-switching approachData-injection attacks in stochastic control systems: detectability and performance tradeoffsResilience to denial-of-service and integrity attacks: a structured systems approachResilient control of cyber‐physical systems under sensor and actuator attacks driven by adaptive sliding mode observerDistributed infinite‐horizon optimal control of continuous‐time linear systems over networkEstimating pollution spread in water networks as a Schrödinger bridge problem with partial informationQuickest physical watermarking-based detection of measurement replacement attacks in networked control systemsDifferential initial-value privacy and observability of linear dynamical systemsOutput-sensitive event-triggered path following control of autonomous ground vehicles under stochastic FDI attacksOptimal resilient sensor placement problem for secure state estimationAdaptive dynamic programming for security of networked control systems with actuator saturationNeural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signalDetection and mitigation of biasing attacks on distributed estimation networksA secure control mechanism for network environmentsControl Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic SystemSwitched projected gradient descent algorithms for secure state estimation under sparse sensor attacksCyber attack estimation and detection for cyber-physical power systemsAttack allocation on remote state estimation in multi-systems: structural results and asymptotic solutionSecurity-based resilient event-triggered control of networked control systems under denial of service attacksA data-driven covert attack strategy in the closed-loop cyber-physical systemsCyber-attacks and faults reconstruction using finite time convergent observation algorithms: electric power network applicationResilient synchronization of distributed multi-agent systems under attacksUnknown source in spatially distributed systems: identifiability analysis and estimationUsability aware secret protection with minimum costIncentive-based fault tolerant control of evolutionary matrix gamesDynamic model predictive control for constrained cyber-physical systems subject to actuator attacks




This page was built for publication: Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems