Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach
From MaRDI portal
Publication:6069272
DOI10.1002/rnc.6232zbMath1528.93081OpenAlexW4281748186MaRDI QIDQ6069272
Ziyang Zhen, Zhengen Zhao, Yuzhe Li, Lei Cui, Yunsong Xu, Yi-min Huang
Publication date: 16 December 2023
Published in: International Journal of Robust and Nonlinear Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/rnc.6232
Control/observation systems involving computers (process control, etc.) (93C83) Computer security (68M25) Networked control (93B70)
Cites Work
- Unnamed Item
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Model-based fault diagnosis techniques. Design schemes, algorithms and tools
- On the angular metrics between linear subspaces
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Secure analysis of dynamic networks under pinning attacks against synchronization
- Secure trajectory planning against undetectable spoofing attacks
- A secure control framework for resource-limited adversaries
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Observer‐based attack‐resilient control for linear systems against FDI attacks on communication links from controller to actuators
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Stability analysis on networked control systems under double attacks with predictive control
- A Moving Target Defense Control Framework for Cyber-Physical Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- On the Performance Analysis of Reset Attack in Cyber-Physical Systems
- Attack Detection and Identification in Cyber-Physical Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
This page was built for publication: Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach