Pages that link to "Item:Q5358515"
From MaRDI portal
The following pages link to Optimal Linear Cyber-Attack on Remote State Estimation (Q5358515):
Displaying 50 items.
- State estimation under false data injection attacks: security analysis and system protection (Q680516) (← links)
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution (Q680517) (← links)
- Improved adaptive resilient control against sensor and actuator attacks (Q781045) (← links)
- Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems (Q826753) (← links)
- Worst-case stealthy innovation-based linear attack on remote state estimation (Q1640242) (← links)
- Consistent distributed state estimation with global observability over sensor network (Q1642219) (← links)
- Distributed filtering under false data injection attacks (Q1737772) (← links)
- Secure remote state estimation against linear man-in-the-middle attacks using watermarking (Q2003830) (← links)
- Optimal stealthy false data injection attacks in cyber-physical systems (Q2005526) (← links)
- Towards quantifying the impact of randomly occurred attacks on a class of networked control systems (Q2011880) (← links)
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data (Q2021302) (← links)
- Permutation entropy based detection scheme of replay attacks in industrial cyber-physical systems (Q2027448) (← links)
- Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels (Q2030995) (← links)
- Resilient strategy design for cyber-physical system under active eavesdropping attack (Q2041382) (← links)
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack (Q2047102) (← links)
- Detection against randomly occurring complex attacks on distributed state estimation (Q2056302) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- Probabilistic-constrained tracking control for stochastic time-varying systems under deception attacks: a round-robin protocol (Q2058008) (← links)
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (Q2063783) (← links)
- Malicious adversaries against secure state estimation: Sparse sensor attack design (Q2063792) (← links)
- How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks (Q2063849) (← links)
- Data-driven modeling of the temporal evolution of breakers' states in the French electrical transmission grid (Q2085135) (← links)
- Optimal linear attack for multi-sensor network against state estimation (Q2095002) (← links)
- Guaranteed performance impulsive tracking control of multi-agents systems under discrete-time deception attacks (Q2108641) (← links)
- Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme (Q2109274) (← links)
- Security analysis and defense strategy of distributed filtering under false data injection attacks (Q2123223) (← links)
- Adaptive event-triggered resilient control of industrial cyber physical systems under asynchronous data injection attack (Q2137093) (← links)
- Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis (Q2165949) (← links)
- Stability analysis of token-based wireless networked control systems under deception attacks (Q2198105) (← links)
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems (Q2224736) (← links)
- Resilient decentralized adaptive tracking control for nonlinear interconnected systems with unknown control directions against DoS attacks (Q2247161) (← links)
- Attack and estimator design for multi-sensor systems with undetectable adversary (Q2280939) (← links)
- Event-trigger-based adaptive output feedback approximately optimal tracking control of a class of MIMO non-affine nonlinear systems (Q2297410) (← links)
- Optimal deception attacks against remote state estimation in cyber-physical systems (Q2297415) (← links)
- A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks (Q2338198) (← links)
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs (Q2409156) (← links)
- Consensus-based filtering under false data injection attacks (Q2423951) (← links)
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems (Q2660860) (← links)
- Encryption scheduling for remote state estimation under an operation constraint (Q2664258) (← links)
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors (Q2682284) (← links)
- Adaptive fuzzy output feedback control for a class of uncertain nonlinear systems in the presence of sensor attacks (Q2684652) (← links)
- Optimal acknowledgment signal attacks against remote estimation (Q6053863) (← links)
- Man-in-the-middle attack against cyber-physical systems under random access protocol (Q6066143) (← links)
- Distributed resilient fusion estimation for resource-limited CPSs under hybrid attacks (Q6077022) (← links)
- Dynamic event-triggered \(\mathcal{L}_\infty\) control for networked control systems under deception attacks: a switching method (Q6081071) (← links)
- Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks (Q6082753) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Optimal stealthy attack with historical data on cyber-physical systems (Q6109035) (← links)
- On consistency and stability of distributed Kalman filter under mismatched noise covariance and uncertain dynamics (Q6110287) (← links)
- Security control of integral sliding modes for multi-agent systems under false data injection attacks (Q6121070) (← links)