A stealthy man-in-the-middle attack strategy for switched systems
From MaRDI portal
Publication:6544841
Recommendations
- Two-channel stealthy false data injection attacks design without estimator knowledge
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems
- Performance analysis for cyber-physical systems under two types of stealthy deception attacks
- Security analysis for cyber-physical systems under undetectable attacks: a geometric approach
Cites work
- scientific article; zbMATH DE number 3563783 (Why is no real title available?)
- A Moving Target Defense for Securing Cyber-Physical Systems
- A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
- A resilient convex combination for consensus-based distributed algorithms
- Active mode observability of switching linear systems
- Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems
- Attack Detection and Identification in Cyber-Physical Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- Conditions for distinguishability and observability of switched linear systems
- Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Necessary and Sufficient Condition for Controlled Distinguishability of Continuous-Time Bilinear Systems
- Novel Stealthy Attack and Defense Strategies for Networked Control Systems
- On controlled mode discernibility for nonlinear hybrid systems with unknown exogenous input
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
- Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems
- Robust discerning controls for the operating modes of linear switched systems subject to bounded unknown inputs
- Secure Control Systems: A Quantitative Risk Management Approach
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Switch observability for switched linear systems
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
This page was built for publication: A stealthy man-in-the-middle attack strategy for switched systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6544841)