2016 American Control Conference (ACC) 2016
DOI: 10.1109/acc.2016.7524931
|View full text |Cite
|
Sign up to set email alerts
|

A case study of a systematic attack design method for critical infrastructure cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The previous examples show how MBAM can reduce the number of parameters used to describe a set of models. The reduced parameter descriptions for the first example, given by (19) and (20), parameterize a subset of the original model class, but this subset is chosen to be "representative" of the original class in the sense that it is a set of models on the boundary of the original set. We can parameterize this set of boundary models with fewer parameters than the original set, hence MBAM is a parameter-reduction technique.…”
Section: Parameterizations Of Lti Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The previous examples show how MBAM can reduce the number of parameters used to describe a set of models. The reduced parameter descriptions for the first example, given by (19) and (20), parameterize a subset of the original model class, but this subset is chosen to be "representative" of the original class in the sense that it is a set of models on the boundary of the original set. We can parameterize this set of boundary models with fewer parameters than the original set, hence MBAM is a parameter-reduction technique.…”
Section: Parameterizations Of Lti Systemsmentioning
confidence: 99%
“…Although the dynamical order was not reduced in the example above, the reduced models are simpler. While the original model exhibited nonlinear dynamics, the approximate models in (19) and ( 20) are linear and constant, respectively. Note that code for computing each step of the MBAM process can be found at [63].…”
Section: A Michaelis Menten Examplementioning
confidence: 99%
“…In fact, research on cybersecurity undertaken from the perspective of critical infrastructure protection is growing across the world (Gonzalez et al, 2006;Grimsman et al, 2016;Karabacak et al, 2015;Ten et al, 2010;Thakur et al;, Zhou et al, 2011etc.). Nevertheless, little of that research has focused on trustrelated issues despite the multidisciplinarity characteristic of trust, which is a concept used in both soft and hard sciences, and the multifaceted nature of critical infrastructures, which include machines, technologies, humans, organizations, and institutions.…”
Section: Ingénierie Des Systèmes D'informationmentioning
confidence: 99%
“…use optimal control to find an attack in constrained conditions [6]. In [11], the authors attempt to find a generalized formulation of attacks based on system vulnerabilities. Ramasubramanian et.…”
mentioning
confidence: 99%