Pages that link to "Item:Q2980416"
From MaRDI portal
The following pages link to On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks (Q2980416):
Displaying 47 items.
- State estimation under false data injection attacks: security analysis and system protection (Q680516) (← links)
- Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer (Q778473) (← links)
- Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks (Q780951) (← links)
- Secure Luenberger-like observers for cyber-physical systems under sparse actuator and sensor attacks (Q1716583) (← links)
- Distributed filtering under false data injection attacks (Q1737772) (← links)
- Securing state reconstruction under sensor and actuator attacks: theory and design (Q1987261) (← links)
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking (Q2003830) (← links)
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data (Q2021302) (← links)
- ISS control synthesis of T-S fuzzy systems with multiple transmission channels under denial of service (Q2027360) (← links)
- Resilient observer-based control for cyber-physical systems under denial-of-service attacks (Q2054028) (← links)
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis (Q2055571) (← links)
- Detection against randomly occurring complex attacks on distributed state estimation (Q2056302) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- The vulnerability of distributed state estimator under stealthy attacks (Q2065222) (← links)
- An adaptive cubature Kalman filter for nonlinear systems against randomly occurring injection attacks (Q2073100) (← links)
- Voluntary defense strategy and quantized sample-data control for T-S fuzzy networked control systems with stochastic cyber-attacks and its application (Q2113715) (← links)
- Adaptive finite-time control for cyber-physical systems with injection and deception attacks (Q2148093) (← links)
- Secure rendezvous and static containment in multi-agent systems with adversarial intruders (Q2158999) (← links)
- Output feedback secure control for cyber-physical systems against sparse sensor attacks (Q2189871) (← links)
- Distributed consensus control for multi-agent systems under denial-of-service (Q2195471) (← links)
- Stability analysis of token-based wireless networked control systems under deception attacks (Q2198105) (← links)
- A dynamic event-triggered approach to observer-based PID security control subject to deception attacks (Q2203075) (← links)
- A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index (Q2224724) (← links)
- Security metrics and synthesis of secure control systems (Q2307530) (← links)
- Optimal switching integrity attacks on sensors in Industrial control systems (Q2330359) (← links)
- On a security vs privacy trade-off in interconnected dynamical systems (Q2663923) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- Security control scheme for cyber-physical system with a complex network in physical layer against false data injection attacks (Q2698219) (← links)
- Sliding mode control for discrete-time systems with randomly occurring uncertainties and nonlinearities under hybrid cyber attacks (Q2700461) (← links)
- Security weakness of dynamic watermarking-based detection for generalised replay attacks (Q5073336) (← links)
- A zonotopic characterization of cyber‐physical system vulnerabilities (Q6063748) (← links)
- Vulnerability analysis of distributed state estimation under joint deception attacks (Q6073113) (← links)
- Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks (Q6082753) (← links)
- Secure state estimation for cyber-physical systems by unknown input observer with adaptive switching mechanism (Q6095613) (← links)
- Secure and asynchronous filtering for piecewise homogeneous Markov jump systems with quantization and round-robin communication (Q6121660) (← links)
- Performance analysis for cyber-physical systems under two types of stealthy deception attacks (Q6152568) (← links)
- Identification of FIR systems with binary-valued observations against denial-of-service attacks (Q6160588) (← links)
- Deep reinforcement learning control approach to mitigating actuator attacks (Q6160810) (← links)
- A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems (Q6164035) (← links)
- Distributed secure state estimation for linear systems against malicious agents through sorting and filtering (Q6164036) (← links)
- Efficient secure state estimation against sparse integrity attack for regular linear system (Q6177343) (← links)
- Optimal attack strategy against fault detectors for linear cyber-physical systems (Q6180214) (← links)
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems (Q6182088) (← links)
- Event‐triggered output feedback predictive control for Takagi‐Sugeno model with bounded disturbance and redundant channels (Q6190338) (← links)
- Performance based attack detection and security analysis for cyber‐physical systems (Q6190354) (← links)
- Design of false data injection attacks in cyber-physical systems (Q6195444) (← links)
- Adaptive attitude control for spacecraft systems with sensor and actuator attacks (Q6495649) (← links)