Pages that link to "Item:Q2409156"
From MaRDI portal
The following pages link to Data-injection attacks in stochastic control systems: detectability and performance tradeoffs (Q2409156):
Displaying 46 items.
- Worst-case stealthy innovation-based linear attack on remote state estimation (Q1640242) (← links)
- SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information (Q1737646) (← links)
- Distributed filtering under false data injection attacks (Q1737772) (← links)
- Securing state reconstruction under sensor and actuator attacks: theory and design (Q1987261) (← links)
- Stochastic coding detection scheme in cyber-physical systems against replay attack (Q2005521) (← links)
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data (Q2021302) (← links)
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack (Q2047102) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme (Q2109274) (← links)
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach (Q2203055) (← links)
- A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index (Q2224724) (← links)
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems (Q2224736) (← links)
- Performance degradation of stealthy attacks against sensor measurements in vector systems (Q2224744) (← links)
- Attack and estimator design for multi-sensor systems with undetectable adversary (Q2280939) (← links)
- Secure trajectory planning against undetectable spoofing attacks (Q2288665) (← links)
- Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems (Q2288700) (← links)
- Optimal deception attacks against remote state estimation in cyber-physical systems (Q2297415) (← links)
- Consensus-based filtering under false data injection attacks (Q2423951) (← links)
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems (Q2660860) (← links)
- Event-triggered control for stochastic networked control systems against denial-of-service attacks (Q2663486) (← links)
- Security index based on perfectly undetectable attacks: graph-theoretic conditions (Q2665727) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks (Q5026777) (← links)
- Security analysis and fault detection against stealthy replay attacks (Q5863736) (← links)
- A zonotopic characterization of cyber‐physical system vulnerabilities (Q6063748) (← links)
- Stabilization of random nonlinear systems subject to deception attacks (Q6071466) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Optimal stealthy attack with historical data on cyber-physical systems (Q6109035) (← links)
- Finite-time covert attacks on reference tracking systems with unknown-but-bounded noises (Q6144134) (← links)
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems (Q6154461) (← links)
- Innovation-based stealthy attack against distributed state estimation over sensor networks (Q6160767) (← links)
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems (Q6182088) (← links)
- Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels (Q6190376) (← links)
- Distributed robust‐multivariate‐observer‐based FDI attacks estimation for nonlinear multi‐agent systems with directed graphs (Q6197892) (← links)
- Byzantine-resilient distributed observers for LTI systems (Q6200695) (← links)
- Privacy and security trade-off in cyber-physical systems: an information theory-based framework (Q6498553) (← links)
- Distributed observer for LTI systems under stochastic impulsive sequential attacks (Q6537323) (← links)
- A stealthy man-in-the-middle attack strategy for switched systems (Q6544841) (← links)
- Stabilizing nonlinear model predictive control under denial-of-service attack via dynamic samples selection (Q6550210) (← links)
- Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems (Q6562327) (← links)
- Data-driven attack policy design for cyber-physical systems under channel constraints (Q6564934) (← links)
- Two-channel false data injection attacks on multi-sensor remote state estimation (Q6583191) (← links)
- Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks (Q6585389) (← links)
- Nonlinear stealthy attacks on remote state estimation (Q6585394) (← links)
- Asymmetrical vulnerability of heterogeneous multi-agent systems under false-data injection attacks (Q6659230) (← links)