Pages that link to "Item:Q2982577"
From MaRDI portal
The following pages link to Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach (Q2982577):
Displaying 50 items.
- A multi-channel transmission schedule for remote state estimation under DoS attacks (Q518312) (← links)
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution (Q680517) (← links)
- Worst-case stealthy innovation-based linear attack on remote state estimation (Q1640242) (← links)
- Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks (Q1661943) (← links)
- SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information (Q1737646) (← links)
- Stackelberg game for secure estimation of linear systems subject to unknown input and smart jamming (Q1989314) (← links)
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking (Q2003830) (← links)
- Towards quantifying the impact of randomly occurred attacks on a class of networked control systems (Q2011880) (← links)
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data (Q2021302) (← links)
- Switching resilient control scheme for cyber-physical systems against DoS attacks (Q2030916) (← links)
- Observer-based synchronization control for complex networks against asynchronous attacks (Q2055563) (← links)
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis (Q2055571) (← links)
- Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks (Q2056334) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- The vulnerability of distributed state estimator under stealthy attacks (Q2065222) (← links)
- Kalman filtering under unknown inputs and norm constraints (Q2065224) (← links)
- Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation (Q2071987) (← links)
- Optimal linear attack for multi-sensor network against state estimation (Q2095002) (← links)
- Sensor scheduling design for complex networks under a distributed state estimation framework (Q2097790) (← links)
- Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption (Q2139795) (← links)
- On the analysis of open-loop Nash equilibria admitting a feedback synthesis in nonlinear differential games (Q2151904) (← links)
- Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis (Q2165949) (← links)
- Defensive deception against reactive jamming attacks in remote state estimation (Q2173899) (← links)
- Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework (Q2195307) (← links)
- Filtering for systems subject to unknown inputs without a priori initial information (Q2203068) (← links)
- A dynamic event-triggered approach to observer-based PID security control subject to deception attacks (Q2203075) (← links)
- Optimal denial-of-service attack energy management against state estimation over an SINR-based network (Q2207221) (← links)
- Timely detection and mitigation of IoT-based cyberattacks in the smart grid (Q2224739) (← links)
- Multi-sensor Kalman filtering over packet-dropping networks subject to round-robin protocol scheduling (Q2235404) (← links)
- Distributed formation control with open-loop Nash strategy (Q2280774) (← links)
- Distributed Krein space-based attack detection over sensor networks under deception attacks (Q2280950) (← links)
- Secure analysis of dynamic networks under pinning attacks against synchronization (Q2288587) (← links)
- Dynamic games in cyber-physical security: an overview (Q2292106) (← links)
- Observer-based guaranteed cost control of cyber-physical systems under DoS jamming attacks (Q2423955) (← links)
- Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol (Q2664251) (← links)
- Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework (Q2980871) (← links)
- Switched Stackelberg game analysis of false data injection attacks on networked control systems (Q5122248) (← links)
- False data injection attack on consensus‐based distributed estimation (Q5283271) (← links)
- Secure control for cyber-physical systems with positive constraint under DoS attack (Q6046484) (← links)
- An event‐triggered approach to security control for networked systems using hybrid attack model (Q6060464) (← links)
- Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach (Q6069272) (← links)
- Energy efficient management for distributed state estimation under DoS attacks (Q6071454) (← links)
- Optimal filter design for cyber‐physical systems under stealthy hybrid attacks (Q6083905) (← links)
- Event‐triggered security control for fuzzy‐model‐based cyber‐physical systems under Denial‐of‐Service attacks and actuator faults (Q6117692) (← links)
- Binary observation‐based FIR system identification under sequence denial of service attacks (Q6117742) (← links)
- Whittle's index based sensor scheduling for multiprocess systems under DoS attacks (Q6130970) (← links)
- Differential privacy for symbolic systems with application to Markov chains (Q6160739) (← links)
- Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks (Q6191142) (← links)
- A data‐based event‐triggered control for switching topology nonlinear multiagent systems with DoS attacks (Q6194548) (← links)
- Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power (Q6197941) (← links)