Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation
From MaRDI portal
Publication:6137552
Recommendations
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- The vulnerability of distributed state estimator under stealthy attacks
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Distributed Secure State Estimation in the Presence of Malicious Agents
- Detection against randomly occurring complex attacks on distributed state estimation
- Distributed secure state estimation for cyber-physical systems under sensor attacks
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Distributed secure state estimation for linear systems against malicious agents through sorting and filtering
- A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
Cited in
(3)
This page was built for publication: Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6137552)