2020 IEEE Conference on Control Technology and Applications (CCTA) 2020
DOI: 10.1109/ccta41146.2020.9206373
|View full text |Cite
|
Sign up to set email alerts
|

Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…As a result, the attack can cause disruption in the power flow and lead to time delays at different frequencies. From the attacker's point of view, a replay attack can intentionally disrupt the system and various processes completely [233].…”
Section: Denial Of Service (Dos)mentioning
confidence: 99%
“…As a result, the attack can cause disruption in the power flow and lead to time delays at different frequencies. From the attacker's point of view, a replay attack can intentionally disrupt the system and various processes completely [233].…”
Section: Denial Of Service (Dos)mentioning
confidence: 99%
“…In cloud computing, whenever data is transmitted, the data can be of two types; the first is authentic data and the second non-authentic data [17]. Authentic data comes from valid users, while inauthentic data is the data that comes from the attacker [18], or is the data that the attacker sends for phishing. Various techniques and detection mechanisms have been developed to prevent intrusive activities.…”
Section: Replay Attacks On Datamentioning
confidence: 99%
“…Theorem 2: The RB R described in (11) ensures the robust stability of (29) with guaranteed H ∞ -norm T wz ∞ ≤ γ if the following condition holds:…”
Section: Design Of the H ∞ Reconfiguration Blockmentioning
confidence: 99%
“…Similarly, according to the S-procedure, the set x Qx ≤ 1 is a robustly positively invariant set for the dynamics in (29) if the following inequality holds:…”
Section: Design Of the H ∞ Reconfiguration Blockmentioning
confidence: 99%
See 1 more Smart Citation