Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
出版年份 2021 全文链接
标题
Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
作者
关键词
Stealthy integrity attacks, Remote state estimation, Historical data, Encryption
出版物
AUTOMATICA
Volume 128, Issue -, Pages 109555
出版商
Elsevier BV
发表日期
2021-03-14
DOI
10.1016/j.automatica.2021.109555
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- False Data Injection and Detection in LQG Systems: A Game Theoretic Approach
- (2020) Ruochi Zhang et al. IEEE Transactions on Control of Network Systems
- On stochastic and deterministic event-based state estimation
- (2020) Hao Yu et al. AUTOMATICA
- Convex Optimization Based State Estimation Against Sparse Integrity Attacks
- (2019) Duo Han et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Secure analysis of dynamic networks under pinning attacks against synchronization
- (2019) Yuzhe Li et al. AUTOMATICA
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- (2019) Gyunghoon Park et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Security Against False Data-Injection Attack in Cyber-Physical Systems
- (2019) Arpan Chattopadhyay et al. IEEE Transactions on Control of Network Systems
- Malicious Attacks on State Estimation Against Distributed Control Systems
- (2019) An-Yang Lu et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- An Event-Based Stealthy Attack on Remote State Estimation
- (2019) Peng Cheng et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Worst-case stealthy innovation-based linear attack on remote state estimation
- (2018) Ziyang Guo et al. AUTOMATICA
- Secure estimation based Kalman Filter for cyber–physical systems against sensor attacks
- (2018) Young Hwan Chang et al. AUTOMATICA
- Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution
- (2018) Xiaoqiang Ren et al. AUTOMATICA
- State estimation under false data injection attacks: Security analysis and system protection
- (2018) Liang Hu et al. AUTOMATICA
- False Data Injection Attacks on Networked Control Systems: A Stackelberg-Game Analysis
- (2018) Yuzhe Li et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems
- (2018) Dawei Shi et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks
- (2018) Jiahu Qin et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds
- (2017) Cheng-Zong Bai et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Event-based state estimation of linear dynamic systems with unknown exogenous inputs
- (2016) Dawei Shi et al. AUTOMATICA
- On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks
- (2016) Yilin Mo et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- A secure control framework for resource-limited adversaries
- (2015) André Teixeira et al. AUTOMATICA
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- (2015) Yuzhe Li et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
- (2014) Hamza Fawzi et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Event-triggered maximum likelihood state estimation
- (2013) Dawei Shi et al. AUTOMATICA
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- (2010) Shreyas Sundaram et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started