Window-type detector for stealthy false data injection attack in cyber-physical systems
DOI10.1080/00207721.2023.2186754zbMATH Open1520.93196OpenAlexW4323840567MaRDI QIDQ6164484FDOQ6164484
Authors: Zhiyu Xi
Publication date: 4 July 2023
Published in: International Journal of Systems Science. Principles and Applications of Systems and Integration (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207721.2023.2186754
Recommendations
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Attacks detection and security control for cyber-physical systems under false data injection attacks
- Optimal stealthy false data injection attacks in cyber-physical systems
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Blended Active Detection Strategy for False Data Injection Attacks in Cyber-Physical Systems
- False Data Injection Attacks Against State Estimation Without Knowledge of Estimators
- Observer-based detection and identification of sensor attacks in networked CPSs
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach
- Finite-time memory fault detection filter design for nonlinear discrete systems with deception attacks
- Setpoint Attack Detection in Cyber-Physical Systems
- Man-in-the-middle attack against cyber-physical systems under random access protocol
Cited In (4)
- The detection mechanism for false data injection attack via the ellipsoidal set-membership approach
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Design of false data injection attacks in cyber-physical systems
- Optimal thresholds for anomaly-based intrusion detection in dynamical environments
This page was built for publication: Window-type detector for stealthy false data injection attack in cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6164484)