Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
From MaRDI portal
Recommendations
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Worst-case stealthy innovation-based linear attack on remote state estimation
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
Cites work
- scientific article; zbMATH DE number 44406 (Why is no real title available?)
- An Event-Based Stealthy Attack on Remote State Estimation
- An Online Approach to Physical Watermark Design
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- Defensive deception against reactive jamming attacks in remote state estimation
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Distributed filtering under false data injection attacks
- Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems
- False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis
- Homomorphic encryption and applications
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- Optimal Attack Energy Allocation against Remote State Estimation
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Optimal Linear Cyber-Attack on Remote State Estimation
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- Relaxing Integrity Requirements for Attack-Resilient Cyber-Physical Systems
- Remote State Estimation in the Presence of an Active Eavesdropper
- Resilient Distributed Optimization Algorithm Against Adversarial Attacks
- SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
- Secure State Estimation With Byzantine Sensors: A Probabilistic Approach
- Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- State estimation under false data injection attacks: security analysis and system protection
- State-Secrecy Codes for Networked Linear Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- The Vulnerability of Cyber-Physical System Under Stealthy Attacks
- Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
- Worst-case stealthy innovation-based linear attack on remote state estimation
Cited in
(9)- Secure remote state estimation against linear man-in-the-middle attacks using watermarking
- On vulnerability of Kalman filtering with holistic estimation performance loss
- Distributed encryption fusion estimation against full eavesdropping
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
- Nonlinear stealthy attacks on remote state estimation
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
- Innovation-based stealthy attack against distributed state estimation over sensor networks
- Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
- A defense strategy for false data injection attacks in multi-agent systems
This page was built for publication: Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2063783)