Stealthy attacks formalized as STL formulas for Falsification of CPS Security
From MaRDI portal
Publication:6202097
Cites work
- An inverted pendulum on a fixed and movable base
- Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
- Effective hybrid system falsification using Monte Carlo tree search guided by QB-robustness
- Efficient global optimization of expensive black-box functions
- Falsification of LTL Safety Properties in Hybrid Systems
- Falsification of cyber-physical systems with robustness-guided black-box checking
- Monte-Carlo techniques for falsification of temporal properties of non-linear hybrid systems
- Robust satisfaction of temporal logic over real-valued signals
- Robustness of temporal logic specifications for continuous-time signals
- S-TaLiRo: a tool for temporal logic falsification for hybrid systems
- Secure Estimation in the Presence of Integrity Attacks
- Simulation-Based Approaches for Verification of Embedded Control Systems: An Overview of Traditional and Advanced Modeling, Testing, and Verification Techniques
- Test Coverage for Continuous and Hybrid Systems
- The design and analysis of computer experiments.
This page was built for publication: Stealthy attacks formalized as STL formulas for Falsification of CPS Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6202097)