2019 18th European Control Conference (ECC) 2019
DOI: 10.23919/ecc.2019.8795849
|View full text |Cite
|
Sign up to set email alerts
|

Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook

Abstract: DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 58 publications
0
10
0
Order By: Relevance
“…In particular, Constraints (12), (13) and (14) are used to propagate the constraints on r x,q,q 1 , based on the synchronous product construction and the inductive definition of reachability. We just need to note that special attention must be paid to each σ ∈ Σ c,A ∩ Σ uo transition, and we need to use l x,σ instead on each state x ∈ X = {x 0 , x 1 , .…”
Section: Bounded Resilient Supervisor Synthesismentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, Constraints (12), (13) and (14) are used to propagate the constraints on r x,q,q 1 , based on the synchronous product construction and the inductive definition of reachability. We just need to note that special attention must be paid to each σ ∈ Σ c,A ∩ Σ uo transition, and we need to use l x,σ instead on each state x ∈ X = {x 0 , x 1 , .…”
Section: Bounded Resilient Supervisor Synthesismentioning
confidence: 99%
“…, x n−1 }. Based on Constraints (12), (13) and (14), Constraints (15) are used to ensure L(G 1 ) ⊆ L(S G). Let φ S T le f t denote the resultant formula after combining Constraints (11), (12), (13), (14) and (15).…”
Section: Bounded Resilient Supervisor Synthesismentioning
confidence: 99%
See 1 more Smart Citation
“…Cyber-physical systems are intelligent interconnected systems which are particularly exposed to network-based malicious attacks. Their security is a topic which during the last years has received much attention in different information and communications technology (ICT) communities such as automatic control [1], [2], computer science and engineering [3], [4], and telecommunications [5].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, security of cyber-physical systems has drawn much research interest within the discrete-event systems and formal methods community [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]. For a recent survey on the discreteevent systems based approach for the security of cyber-physical systems, the reader is referred to [18]. In this paper, we shall focus on discrete-event systems as our model of cyber-physical systems and consider the problem of attacker synthesis, as a major step towards solving the resilient supervisor synthesis problem [14].…”
Section: Introductionmentioning
confidence: 99%