2023
DOI: 10.1016/j.dche.2023.100100
|View full text |Cite
|
Sign up to set email alerts
|

A reachable set-based scheme for the detection of false data injection cyberattacks on dynamic processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 24 publications
0
7
0
Order By: Relevance
“…For example, detection of some attacks may be possible when the detection scheme uses the residual to monitor the process; however, these attacks may go undetected when the detection scheme uses the measured output. This realization motivated the formulation of a generalized monitoring variable in [13,14] which may be expressed in terms of the measured and estimated outputs as:…”
Section: Commonly Used Monitoring Variables Include the Measured Outputmentioning
confidence: 99%
See 4 more Smart Citations
“…For example, detection of some attacks may be possible when the detection scheme uses the residual to monitor the process; however, these attacks may go undetected when the detection scheme uses the measured output. This realization motivated the formulation of a generalized monitoring variable in [13,14] which may be expressed in terms of the measured and estimated outputs as:…”
Section: Commonly Used Monitoring Variables Include the Measured Outputmentioning
confidence: 99%
“…In this work, we use a class of detection schemes that track the evolution of the monitoring variable at each time step with respect to the reachable sets of the attack-free process at that time step [14]. The detection logic is given by:…”
Section: Commonly Used Monitoring Variables Include the Measured Outputmentioning
confidence: 99%
See 3 more Smart Citations