Stealthy output injection attacks on control systems with bounded variables
From MaRDI portal
Publication:5348293
Recommendations
- Optimal stealthy false data injection attacks in cyber-physical systems
- False data injection attacks on sensors against state estimation in cyber-physical systems
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
Cites work
- Fault diagnosis and fault tolerant control using set-membership approaches: application to real case studies
- Guaranteed state estimation by zonotopes
- Interval predictor models: identification and reliability
- Model predictive control: recent developments and future promise
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
Cited in
(7)- Stealthy attacks and attack-resilient interval observers
- Optimal switching integrity attacks on sensors in Industrial control systems
- Masking attack for sampled-data systems via input redundancy
- On the confidentiality of controller states under sensor attacks
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Stealthy deception attacks on water SCADA systems
- Detection and mitigation of classes of attacks in supervisory control systems
This page was built for publication: Stealthy output injection attacks on control systems with bounded variables
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5348293)