3.8 Proceedings Paper

Maximization of Damage from a Non-Detected Cyber-Attack to a Control System with an Invariant-Set-Based Protection

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Set-theoretic detection of data corruption attacks on cyber physical power systems

Efstathios Kontouras et al.

JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY (2018)

Article Automation & Control Systems

Optimal Linear Cyber-Attack on Remote State Estimation

Ziyang Guo et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Engineering, Electrical & Electronic

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach

Jinsub Kim et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2015)

Article Automation & Control Systems

Attack Detection and Identification in Cyber-Physical Systems

Fabio Pasqualetti et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)