Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
From MaRDI portal
Publication:4630139
DOI10.1109/TCNS.2017.2690399MaRDI QIDQ4630139
Yuan Chen, José M. F. Moura, Soummya Kar
Publication date: 29 March 2019
Published in: IEEE Transactions on Control of Network Systems (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1610.03370
Related Items (11)
On a security vs privacy trade-off in interconnected dynamical systems ⋮ Data-injection attacks in stochastic control systems: detectability and performance tradeoffs ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints ⋮ Performance analysis for cyber-physical systems under two types of stealthy deception attacks ⋮ Optimal attack strategy against fault detectors for linear cyber-physical systems ⋮ Secure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observer ⋮ Secure remote state estimation against linear man-in-the-middle attacks using watermarking ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Stealthy attacks and attack-resilient interval observers
This page was built for publication: Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems