Opacity-Enforcing Supervisory Strategies via State Estimator Constructions
From MaRDI portal
Publication:5352804
DOI10.1109/TAC.2011.2170453zbMATH Open1369.93109MaRDI QIDQ5352804FDOQ5352804
Authors: Anooshiravan Saboori, Christoforos N. Hadjicostis
Publication date: 8 September 2017
Published in: IEEE Transactions on Automatic Control (Search for Journal in Brave)
Formal languages and automata (68Q45) Observability (93B07) Discrete event control/observation systems (93C65)
Cited In (25)
- Online prognosis of stochastic discrete event systems with guaranteed performance bound
- Using subobservers to synthesize opacity-enforcing supervisors
- Opacity of networked discrete event systems
- Enforcing opacity of regular predicates on modal transition systems
- Games with Opacity Condition
- An optimization-based approach to assess non-interference in labeled and bounded Petri net systems
- Enforcement for infinite-step opacity and K-step opacity via insertion mechanism
- Strong current-state and initial-state opacity of discrete-event systems
- Supervisory control of discrete-event systems under attacks
- Verification and enforcement of current-state opacity based on a state space approach
- A new approach for the verification of infinite-step and \(K\)-step opacity using two-way observers
- Synthesis of insertion functions for enforcement of opacity security properties
- Synthesis of obfuscation policies to ensure privacy and utility
- Current-state opacity enforcement in discrete event systems under incomparable observations
- Enforcement and validation (at runtime) of various notions of opacity
- Obfuscation mechanism for simultaneous public event information release and private event information hiding in discrete event systems
- Enhancement of opacity for distributed state estimation in cyber-physical systems
- Verification and enforcement of strong infinite- and \(k\)-step opacity using state recognizers
- Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder
- On almost-sure intention deception planning that exploits imperfect observers
- Enforcement of opacity by public and private insertion functions
- Active opacity of discrete-event systems
- Online verification of \(K\)-step opacity by Petri nets in centralized and decentralized structures
- Sensor deception attacks against security in supervisory control systems
- Optimization-based assessment of initial-state opacity in Petri nets
This page was built for publication: Opacity-Enforcing Supervisory Strategies via State Estimator Constructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5352804)