Two-channel stealthy false data injection attacks design without estimator knowledge
From MaRDI portal
Publication:6663595
DOI10.1002/ASJC.3409MaRDI QIDQ6663595FDOQ6663595
Authors: Haoran Wang, Yu-Wei Ren, Yixian Fang, Ang Liu
Publication date: 14 January 2025
Published in: Asian Journal of Control (Search for Journal in Brave)
Recommendations
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Complete stealthiness false data injection attack design in multisensor systems with attack resource constraints
- Optimal stealthy false data injection attacks in cyber-physical systems
- Analysis of stealthy false data injection attacks against networked control systems: three case studies
Kalman filtercyber-physical systemsfalse data injection attacksperfect attacksresidual-based detector
Cites Work
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Optimal Linear Cyber-Attack on Remote State Estimation
- False Data Injection Attacks Against State Estimation Without Knowledge of Estimators
- State estimation under false data injection attacks: security analysis and system protection
- Resilient control under denial-of-service: robust design
- Optimal stealthy false data injection attacks in cyber-physical systems
- Security of networked control systems subject to deception attacks: a survey
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Event‐triggered predictive control for networked control systems with network‐induced delays and packet dropouts
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- Cyber Physical Attacks with Control Objectives
- Secure state estimation for cyber-physical systems by unknown input observer with adaptive switching mechanism
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
- Finite time secure state estimation for linear cyber‐physical systems with actuator and sensor attacks
- Design of false data injection attacks in cyber-physical systems
- Two-channel false data injection attacks on multi-sensor remote state estimation
- Rational entropy-based fuzzy fault tolerant control for descriptor stochastic distribution networked control systems with packet dropout
- Fault detection and prediction scheme for nonlinear stochastic distribution systems
- Event-triggered sampled-data synchronization of complex networks with uncertain inner coupling and time-varying delays
Cited In (2)
This page was built for publication: Two-channel stealthy false data injection attacks design without estimator knowledge
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6663595)