Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
From MaRDI portal
Publication:6562327
Recommendations
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Stealthy attack against distributed state estimation for cyber-physical systems
- Optimal stealthy false data injection attacks in cyber-physical systems
- Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems
Cites work
- A novel approach to \(H_\infty\) performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs
- Eigenvalue Inequalities for Matrix Product
- Event triggered control of connected vehicles under multiple cyber attacks
- Event-triggered control for stochastic networked control systems against denial-of-service attacks
- Event-triggered reference governors for collisions-free leader-following coordination under unreliable communication topologies
- On model-based detectors for linear time-invariant stochastic systems under sensor attacks
- Optimal Allocation of False Data Injection Attacks for Networked Control Systems With Two Communication Channels
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- Optimal stealthy attack with historical data on cyber-physical systems
- Optimal stealthy false data injection attacks in cyber-physical systems
- Representations of the Drazin inverse for a class of block matrices
- State estimation under false data injection attacks: security analysis and system protection
- Stochastic coding detection scheme in cyber-physical systems against replay attack
- Worst-Case Stealthy Innovation-Based Linear Attacks on Remote State Estimation Under Kullback–Leibler Divergence
- Worst-case stealthy innovation-based linear attack on remote state estimation
Cited in
(13)- Optimal filter design for cyber‐physical systems under stealthy hybrid attacks
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems
- Man-in-the-middle attack against cyber-physical systems under random access protocol
- Command-governor-based stealthy attack design for estimation difference regulation
- Nonlinear stealthy attacks on remote state estimation
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises
- A class of stealthy attacks on remote state estimation with intermittent observation
- Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
- Data-driven attack policy design for cyber-physical systems under channel constraints
- Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach
- Stealthy attack against distributed state estimation for cyber-physical systems
- Design and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgrids
This page was built for publication: Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6562327)