Window-type detector for stealthy false data injection attack in cyber-physical systems
From MaRDI portal
Publication:6164484
Recommendations
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Attacks detection and security control for cyber-physical systems under false data injection attacks
- Optimal stealthy false data injection attacks in cyber-physical systems
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
Cites work
- scientific article; zbMATH DE number 44406 (Why is no real title available?)
- scientific article; zbMATH DE number 1149166 (Why is no real title available?)
- A Blended Active Detection Strategy for False Data Injection Attacks in Cyber-Physical Systems
- Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach
- Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
- False Data Injection Attacks Against State Estimation Without Knowledge of Estimators
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- Finite-time memory fault detection filter design for nonlinear discrete systems with deception attacks
- Man-in-the-middle attack against cyber-physical systems under random access protocol
- Observer-based detection and identification of sensor attacks in networked CPSs
- Setpoint Attack Detection in Cyber-Physical Systems
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
Cited in
(4)- The detection mechanism for false data injection attack via the ellipsoidal set-membership approach
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme
- Design of false data injection attacks in cyber-physical systems
- Optimal thresholds for anomaly-based intrusion detection in dynamical environments
This page was built for publication: Window-type detector for stealthy false data injection attack in cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6164484)