Novel stealthy attack and defense strategies for networked control systems
This article studies novel attack and defense strategies, based on a class of stealthy attacks,
namely the zero-dynamics attack (ZDA), for multiagent control systems. ZDA poses a …
namely the zero-dynamics attack (ZDA), for multiagent control systems. ZDA poses a …
Detectability of cooperative zero-dynamics attack
This paper studies the detectability of cooperative zero-dynamics attacks, in the context of
coupled harmonic oscillators. A defense strategy, which consists of a strategic topology …
coupled harmonic oscillators. A defense strategy, which consists of a strategic topology …
Strategic topology switching for security-part II: Detection & switching topologies
This two-part paper considers strategic topology switching for security in the second-order
multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero …
multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero …
A novel defense strategy against zero-dynamics attacks in multi-agent systems
This paper studies strategic topology switching for a second-order multi-agent system under
zero-dynamics attack (ZDA) whose attack-starting time is allowed to be not the initial time …
zero-dynamics attack (ZDA) whose attack-starting time is allowed to be not the initial time …
Detectability of intermittent zero-dynamics attack in networked control systems
This paper analyzes stealthy attacks, particularly the zero-dynamics attack (ZDA) in
networked control systems. ZDA hides the attack signal in the null-space of the state-space …
networked control systems. ZDA hides the attack signal in the null-space of the state-space …
Geometrical characterization of sensor placement for cone-invariant and multi-agent systems against undetectable zero-dynamics attacks
Undetectable attacks are an important class of malicious attacks threatening the security of
cyber-physical systems, which can modify a system's state but leave the system output …
cyber-physical systems, which can modify a system's state but leave the system output …
Control-and Game-Theoretic Approaches to Secure Networked Systems
Y Mao - 2019 - search.proquest.com
For large-scale networked systems, see eg, social networks and power networks,
centralized measurement (sensing) and control are not feasible, and hence require the …
centralized measurement (sensing) and control are not feasible, and hence require the …