State estimation under false data injection attacks: security analysis and system protection
From MaRDI portal
Recommendations
- State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity
- False Data Injection Attacks Against State Estimation Without Knowledge of Estimators
- False data injection attacks on sensors against state estimation in cyber-physical systems
- Secure state estimation for cyber-physical systems under sparse data injection attacks: a switched counteraction approach
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- Attacks detection and security control for cyber-physical systems under false data injection attacks
- Secure State Estimation Against Sensor Attacks in the Presence of Noise
- Testing and Defending Methods Against DOS Attack in State Estimation
Cites work
- scientific article; zbMATH DE number 5719293 (Why is no real title available?)
- scientific article; zbMATH DE number 1260395 (Why is no real title available?)
- A secure control framework for resource-limited adversaries
- Attack Detection and Identification in Cyber-Physical Systems
- Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation
- Event-Triggered State Observers for Sparse Sensor Noise/Attacks
- Linear systems theory.
- Matrix mathematics. Theory, facts, and formulas
- On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- Optimal Linear Cyber-Attack on Remote State Estimation
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- Secure State Estimation Against Sensor Attacks in the Presence of Noise
Cited in
(only showing first 100 items - show all)- Fuzzy adaptive secure tracking control against unknown false data injection attacks for uncertain nonlinear systems with input quantization
- Event-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacks
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach
- Security analysis and defense strategy of distributed filtering under false data injection attacks
- Exponential synchronization of coupled neural networks under stochastic deception attacks
- Sampled-data-based consensus of multi-agent systems under asynchronous denial-of-service attacks
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
- Observer-based sliding mode control for fuzzy stochastic switching systems with deception attacks
- Stability analysis of token-based wireless networked control systems under deception attacks
- False data injection attacks on sensors against state estimation in cyber-physical systems
- Robust adaptive sliding mode control for discrete singular systems with randomly occurring mixed time-delays under uncertain occurrence probabilities
- Optimal stealthy false data injection attacks in cyber-physical systems
- Finite-region dissipative dynamic output feedback control for 2-D FM systems with missing measurements
- Worst-case \(\varepsilon \)-stealthy false data injection attacks in cyber-physical systems
- An overview of neuronal state estimation of neural networks with time-varying delays
- Detection against randomly occurring complex attacks on distributed state estimation
- Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks
- Security control for T-S fuzzy systems with multi-sensor saturations and distributed event-triggered mechanism
- Observer-based adaptive event-triggered sliding mode control of saturated nonlinear networked systems with cyber-attacks
- Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks
- Testing and Defending Methods Against DOS Attack in State Estimation
- Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
- A novel sparse false data injection attack method in smart grids with incomplete power network information
- Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels
- Security of networked control systems subject to deception attacks: a survey
- System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
- A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks
- Distributed Krein space-based attack detection over sensor networks under deception attacks
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data
- A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks
- Distributed Kalman filtering over sensor networks with fading measurements and random link failures
- A novel adaptive cooperative attack design against cyber-physical systems via mixed \(H_\infty /H_-\) index
- Data-driven attacks and data recovery with noise on state estimation of smart grid
- Vulnerability analysis of distributed state estimation under joint deception attacks
- Variance-constrained filtering for nonlinear systems with randomly occurring quantized measurements: recursive scheme and boundedness analysis
- Secure state estimation for systems under mixed cyber-attacks: security and performance analysis
- Attack and estimator design for multi-sensor systems with undetectable adversary
- Probability-guaranteed state estimation for nonlinear delayed systems under mixed attacks
- Adaptive distributed Kalman-like filter for power system with cyber attacks
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- A data-driven covert attack strategy in the closed-loop cyber-physical systems
- Event-based leader-follower consensus of nonlinear multi-agent systems under denial-of-service
- A game-based framework towards cyber-attacks on state estimation in ICSS
- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- An improved reduction method based networked control against false data injection attacks and stochastic input delay
- Distributed filtering under false data injection attacks
- Malicious adversaries against secure state estimation: Sparse sensor attack design
- False data injection attack on consensus-based distributed estimation
- The vulnerability of distributed state estimator under stealthy attacks
- SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information
- Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks
- Security control for Markov jump system with adversarial attacks and unknown transition rates via adaptive sliding mode technique
- The safety region-based model predictive control for discrete-time systems under deception attacks
- Optimal linear attack for multi-sensor network against state estimation
- Optimal deception attacks against remote state estimation in cyber-physical systems
- Robust adaptive estimation and tracking control for perturbed cyber-physical systems against denial of service
- Adaptive control of cyber-physical systems under deception and injection attacks
- Security control of cyber-physical switched systems under round-robin protocol: input-to-state stability in probability
- Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
- Optimal filter design for cyber‐physical systems under stealthy hybrid attacks
- A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems
- Integrity attacks on remote estimation with spatial-temporal information sources
- Adaptive sliding-mode tracking control of networked control systems with false data injection attacks
- scientific article; zbMATH DE number 2033509 (Why is no real title available?)
- Robust secure synchronization control for multiple neural networks: An event‐triggered adaptive integral sliding mode method
- Stealthy switching attacks on sensors against state estimation in cyber‐physical systems
- Mobile robot localization under stochastic communication protocol.
- Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms
- Active resilient control for two‐dimensional systems under denial‐of‐service attacks
- Annulus-event-based finite-time fault detection for discrete-time nonlinear systems with probabilistic interval delay and randomly occurring faults
- Man-in-the-middle attack against cyber-physical systems under random access protocol
- Reduced-order-asynchronous-based control for nonlinear jump networked systems with attacks
- Command-governor-based stealthy attack design for estimation difference regulation
- Adaptive attitude control for spacecraft systems with sensor and actuator attacks
- A transmission scheme for secure estimation of cyber-physical systems against malicious attack
- Neural-network-based output feedback adaptive resilient control for stochastic nonlinear systems subject to sensor and actuator attacks
- Attack-resilient asynchronous state estimation of interval type-2 fuzzy systems under stochastic protocols
- Extended observer-based hybrid tracking control strategy for networked system with FDI attacks
- Network steganography based security framework for cyber-physical systems
- A resilient control algorithm to distributed optimization under DoS attacks
- Vulnerability analysis for a class of nonlinear cyber-physical systems under stealthy attacks
- Switched Stackelberg game analysis of false data injection attacks on networked control systems.
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems
- Event‐triggered fault estimation and nonfragile synchronization control for multiweighted complex dynamical networks with deception attacks
- Consensus-based filtering under false data injection attacks
- Probabilistic event-triggered protocol for switched power systems under multi-strategy deception attack
- Dynamic event‐triggered sliding mode security control for Markovian jump systems: Learning‐based iteration optimization method
- K‐filter‐based adaptive output feedback control for high‐order nonlinear systems subject to actuator and sensor attacks
- Dynamic output feedback control for interval type-2 fuzzy systems against DoS attacks and sensor failures
- Induced attack on formation control of multiagent systems with prescribed reference trajectories
- Model-based fault diagnosis of networked systems: a survey
- Protocol-based variance-constrained distributed secure filtering with measurement censoring
- Asynchronous passive dynamic event-triggered controller design for singular Markov jump systems with general transition rates under stochastic cyber-attacks
- Periodic event-triggered and self-triggered control of singular system under stochastic cyber-attacks
- Distributed observer for LTI systems under stochastic impulsive sequential attacks
- Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems
- Ripple effect of cooperative attacks in multi-agent systems: results on minimum attack targets
- Distributed event‐triggered control for bipartite consensus under complex cyber‐attacks
- Resilient time‐varying formation tracking for mobile robot networks under deception attacks on positioning
- Security control based on variable‐step predictive approach for networked control system with denial‐of‐service attacks
This page was built for publication: State estimation under false data injection attacks: security analysis and system protection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q680516)