2022
DOI: 10.1109/tsmc.2022.3144337
|View full text |Cite
|
Sign up to set email alerts
|

Event-Triggered Control and Proactive Defense for Cyber–Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…The suggested technique may identify intelligent cyberattacks that are knowledgeable in system parameters, models, and detection rules. In [102], a switchingbased MTD strategy was developed to detect malicious FDI attacks described by the average dwell-time feature, an ET mechanism was also applied to reduce the cost of data transmission. Even if attacks may remain stealthy when the MTD mechanism is adopted, the impacts of these stealthy attacks on the system performance can be kept to a minimum level.…”
Section: Moving Target Defense For Securing Complex Cyber-physical Ne...mentioning
confidence: 99%
“…The suggested technique may identify intelligent cyberattacks that are knowledgeable in system parameters, models, and detection rules. In [102], a switchingbased MTD strategy was developed to detect malicious FDI attacks described by the average dwell-time feature, an ET mechanism was also applied to reduce the cost of data transmission. Even if attacks may remain stealthy when the MTD mechanism is adopted, the impacts of these stealthy attacks on the system performance can be kept to a minimum level.…”
Section: Moving Target Defense For Securing Complex Cyber-physical Ne...mentioning
confidence: 99%
“…On a micro level, MTD was combined with other elements such as Honey-X and decoys, thereby being conceptualized considering diversified mutation items. In addition, MTD is a potential "game-changing" security solution in special domains such as cyber-physical systems, autonomous vehicles, smart factories, and smart grids that have unprotected communication characteristics [3,[36][37][38][39][40].…”
Section: Background Of Cyber Deceptionmentioning
confidence: 99%
“…28,29 In this regard, event-triggered security control is an effective approach employed to address the security challenges posed by DoS attacks and actuator faults. 30 The methodology enables timely detection and mitigation of DoS attacks and actuator faults by responding to specific events or triggers. In Reference 29, with the presence of faults and cyber-attacks, observer-based event-triggered non-parallel distribution compensation H ∞ control scheme is introduced to address the above issues.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, due to the complexities and long‐term utilization of system components, it is inevitable to generate actuator faults 28,29 . In this regard, event‐triggered security control is an effective approach employed to address the security challenges posed by DoS attacks and actuator faults 30 . The methodology enables timely detection and mitigation of DoS attacks and actuator faults by responding to specific events or triggers.…”
Section: Introductionmentioning
confidence: 99%