Pages that link to "Item:Q4682279"
From MaRDI portal
The following pages link to Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks (Q4682279):
Displaying 17 items.
- Secure estimation based Kalman filter for cyber-physical systems against sensor attacks (Q1626921) (← links)
- Optimal stealthy false data injection attacks in cyber-physical systems (Q2005526) (← links)
- Malicious adversaries against secure state estimation: Sparse sensor attack design (Q2063792) (← links)
- Sliding mode-based adaptive resilient control for Markovian jump cyber-physical systems in face of simultaneous actuator and sensor attacks (Q2151852) (← links)
- Decentralized event-triggered \(H_\infty\) control for neural networks subject to cyber-attacks (Q2198088) (← links)
- Nonfragile integral-based event-triggered control of uncertain cyber-physical systems under cyber-attacks (Q2280268) (← links)
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems (Q2660860) (← links)
- Backstepping control for stochastic nonlinear strict-feedback systems based on observer with incomplete measurements (Q5056560) (← links)
- Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach (Q5069032) (← links)
- Observer-based backstepping control for nonlinear cyber-physical systems with incomplete measurements (Q5863711) (← links)
- A zonotopic characterization of cyber‐physical system vulnerabilities (Q6063748) (← links)
- Sparse attack reconstruction for cyber-physical systems via descriptor reduced-order observer (Q6076440) (← links)
- Binary observation‐based FIR system identification under sequence denial of service attacks (Q6117742) (← links)
- Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method (Q6179982) (← links)
- Optimal stealthy false data injection attacks for networked linear quadratic Gaussian control systems with two channels (Q6190376) (← links)
- A stealthy man-in-the-middle attack strategy for switched systems (Q6544841) (← links)
- Adaptive finite-time fuzzy secure control for nonlinear MASs under deception attacks (Q6545296) (← links)