2016 American Control Conference (ACC) 2016
DOI: 10.1109/acc.2016.7524932
|View full text |Cite
|
Sign up to set email alerts
|

Detection of covert attacks and zero dynamics attacks in cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
57
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 102 publications
(57 citation statements)
references
References 16 publications
0
57
0
Order By: Relevance
“…Let d be the smallest positive integer such that the dth Markov parameter CA d − 1 B of  CL is a nonzero matrix. In this case, it follows from (10)…”
Section: Adaptive Corrective Control Signalmentioning
confidence: 97%
See 2 more Smart Citations
“…Let d be the smallest positive integer such that the dth Markov parameter CA d − 1 B of  CL is a nonzero matrix. In this case, it follows from (10)…”
Section: Adaptive Corrective Control Signalmentioning
confidence: 97%
“…In the work of Weerakkody et al, 9 the development of information flow analyses to support passive and active detection of adversaries in CPS is considered. 10 These attack strategies rely on perfect system knowledge availability. 10 These attack strategies rely on perfect system knowledge availability.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…A combination of Gaussian and Bernoulli processes to generate a watermarking signal is suggested in [188] for general detection of deception attacks on sensors and actuators. The same idea is proposed for use against covert attacks (on both A 2 and A 8 ) in [189] by inserting a modulation system between A 8 and the actuation to misguide and confuse the attacker.…”
Section: B Defense Mechanismsmentioning
confidence: 99%
“…such that there is a linguistic variable that occurs simultaneously in the condition of the rule +1 and in the conclusion of the rule , for = 1, … , − 1and 1 = , otherwise the values of some linguistic variables will remain undefined [6]. This condition is equivalent to the fact that in the specified directed graph there should not be contours.…”
Section: Figure 5 -Model Of Rules That Interpret Security Policy Provmentioning
confidence: 99%