A stealthy man-in-the-middle attack strategy for switched systems
DOI10.1080/00207721.2024.2304127zbMATH Open1537.93366MaRDI QIDQ6544841FDOQ6544841
Authors: Dawei Sun, Inseok Hwang
Publication date: 27 May 2024
Published in: International Journal of Systems Science. Principles and Applications of Systems and Integration (Search for Journal in Brave)
Recommendations
- Two-channel stealthy false data injection attacks design without estimator knowledge
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems
- Performance analysis for cyber-physical systems under two types of stealthy deception attacks
- Security analysis for cyber-physical systems under undetectable attacks: a geometric approach
Control/observation systems governed by functional relations other than differential equations (such as hybrid and switching systems) (93C30) Control/observation systems involving computers (process control, etc.) (93C83) Networked control (93B70)
Cites Work
- Attack Detection and Identification in Cyber-Physical Systems
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Conditions for distinguishability and observability of switched linear systems
- Active mode observability of switching linear systems
- Title not available (Why is that?)
- Switch observability for switched linear systems
- Secure Control Systems: A Quantitative Risk Management Approach
- Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
- Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Robust discerning controls for the operating modes of linear switched systems subject to bounded unknown inputs
- Necessary and Sufficient Condition for Controlled Distinguishability of Continuous-Time Bilinear Systems
- Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
- A resilient convex combination for consensus-based distributed algorithms
- Novel Stealthy Attack and Defense Strategies for Networked Control Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- A Moving Target Defense for Securing Cyber-Physical Systems
- A Switching Multiplicative Watermarking Scheme for Detection of Stealthy Cyber-Attacks
- On controlled mode discernibility for nonlinear hybrid systems with unknown exogenous input
- Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems
This page was built for publication: A stealthy man-in-the-middle attack strategy for switched systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6544841)