Optimal completely stealthy attacks against remote estimation in cyber-physical systems
From MaRDI portal
Publication:6199483
DOI10.1016/j.ins.2022.01.014OpenAlexW4206776398MaRDI QIDQ6199483
Publication date: 28 February 2024
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2022.01.014
Control/observation systems involving computers (process control, etc.) (93C83) Estimation and detection in stochastic control theory (93E10) Networked control (93B70)
Related Items (2)
Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Security of networked control systems subject to deception attacks: a survey
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- State estimation under false data injection attacks: security analysis and system protection
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks
- Optimal stealthy false data injection attacks in cyber-physical systems
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network
- Distributed secure state estimation for cyber-physical systems under sensor attacks
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Byzantine-resilient distributed state estimation: a min-switching approach
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Robust event‐triggered model predictive control for cyber‐physical systems under denial‐of‐service attacks
- Optimal Linear Cyber-Attack on Remote State Estimation
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
This page was built for publication: Optimal completely stealthy attacks against remote estimation in cyber-physical systems