4.6 Article

Optimal Jamming Attack System Against Remote State Estimation in Wireless Network Control Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Detection of stealthy false data injection attacks against networked control systems via active data modification

Zhong-Hua Pang et al.

Summary: This paper investigates the design and detection problems of stealthy false data injection (FDI) attacks against networked control systems from the different perspectives of an attacker and a defender. Proposed solutions for detecting such attacks are presented, and theoretical analysis and simulation results are provided for evaluation.

INFORMATION SCIENCES (2021)

Article Computer Science, Theory & Methods

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework

Aakanksha Tewari et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

Optimal power allocation for multiple DoS attackers in wireless networked control systems

Ling Zhao et al.

ISA TRANSACTIONS (2020)

Article Automation & Control Systems

Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems

Chongrong Fang et al.

AUTOMATICA (2020)

Article Automation & Control Systems

Distributed Event-Triggered Estimation Over Sensor Networks: A Survey

Xiaohua Ge et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Computer Science, Information Systems

Optimal Jamming Attack Scheduling of Interactive Channels

Lan Wu et al.

IEEE ACCESS (2020)

Article Automation & Control Systems

Security Research on Wireless Networked Control Systems Subject to Jamming Attacks

Hongjiu Yang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Computer Science, Artificial Intelligence

Modeling and control of Cyber-Physical Systems subject to cyber attacks: A survey of recent advances and challenges

Magdi S. Mahmoud et al.

NEUROCOMPUTING (2019)

Article Automation & Control Systems

Attack and estimator design for multi-sensor systems with undetectable adversary

Haiyu Song et al.

AUTOMATICA (2019)

Article Computer Science, Information Systems

Optimal stealthy false data injection attacks in cyber-physical systems

Yi-Gang Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Optimal Attack Schedule for Two Sensors State Estimation Under Jamming Attack

Zidong Ai et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Optimal control data scheduling with limited controller-plant communication

Jiapeng Xu et al.

SCIENCE CHINA-INFORMATION SCIENCES (2018)

Article Engineering, Civil

Access Point Deployment Optimization in CBTC Data Communication System

Tao Wen et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems

Lianghong Peng et al.

NEUROCOMPUTING (2018)

Article Automation & Control Systems

Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks

Derui Ding et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2018)

Article Computer Science, Information Systems

Evaluation Models for the Nearest Closer Routing Protocol in Wireless Sensor Networks

Ning Cao et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Denial of Service Defence for Resource Availability in Wireless Sensor Networks

Opeyemi A. Osanaiye et al.

IEEE ACCESS (2018)

Article Automation & Control Systems

Analysis and synthesis of networked control systems: A survey of recent advances and challenges

Dan Zhang et al.

ISA TRANSACTIONS (2017)

Article Engineering, Electrical & Electronic

Robust State Estimator Based on Maximum Exponential Absolute Value

Yanbo Chen et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Automation & Control Systems

Optimal DoS Attack Scheduling in Wireless Networked Control System

Heng Zhang et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2016)

Article Automation & Control Systems

Optimal Denial-of-Service Attack Scheduling With Energy Constraint

Heng Zhang et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)

Article Engineering, Electrical & Electronic

A Robust WLAV State Estimation Using Optimal Transformations

Yanbo Chen et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2015)

Article Automation & Control Systems

An H∞ Fault Estimation Scheme of Wireless Networked Control Systems for Industrial Real-Time Applications

Ying Wang et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2014)

Article Automation & Control Systems

On Optimal Partial Broadcasting of Wireless Sensor Networks for Kalman Filtering

Qing-Shan Jia et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2012)

Article Engineering, Electrical & Electronic

Robust state estimation method based on maximum exponential square

W. Wu et al.

IET GENERATION TRANSMISSION & DISTRIBUTION (2011)