Cybersecurity and supervisory control: A tutorial on robust state estimation, attack synthesis, and resilient control
This tutorial paper studies the effect of deception attacks on compromised sensors and
actuators at the supervisory control layer of cyber-physical control systems. The problem is …
actuators at the supervisory control layer of cyber-physical control systems. The problem is …
Detection of actuator enablement attacks by Petri nets in supervisory control systems
The feedback control system with network-connected components is vulnerable to
cyberattacks. We study a problem of attack detection in supervisory control of discrete-event …
cyberattacks. We study a problem of attack detection in supervisory control of discrete-event …
A classification of cybersecurity strategies in the context of Discrete Event Systems
In recent years, cybersecurity has received increasing attention due to the demand from a
large class of networked systems for resilience against cyberattacks that may compromise …
large class of networked systems for resilience against cyberattacks that may compromise …
Synthesis of optimal covert sensor–actuator attackers for discrete-event systems
This work introduces an approach for the synthesis of optimal covert sensor–actuator
attackers in the context of discrete-event systems (DES). Building upon existing works on …
attackers in the context of discrete-event systems (DES). Building upon existing works on …
Selection of a stealthy and harmful attack function in discrete event systems
In this paper we consider the problem of joint state estimation under attack in partially-
observed discrete event systems. An operator observes the evolution of the plant to evaluate …
observed discrete event systems. An operator observes the evolution of the plant to evaluate …
Fuzzy exponential-approximation ET hybrid impulsive control for networked nonlinear singular jump systems under state reconstruction and random actuator attacks
Y Pang, G Zhuang, X Xie, Y Wang - Information Sciences, 2024 - Elsevier
This article investigates fuzzy exponential-approximation event-triggered (ET) hybrid
impulsive control for networked nonlinear singular Markovian jump systems (SMJSs) under …
impulsive control for networked nonlinear singular Markovian jump systems (SMJSs) under …
Joint state estimation under attack of discrete event systems
The problem of state estimation in the setting of partially-observed discrete event systems
subject to cyber attacks is considered. An operator observes a plant through a natural …
subject to cyber attacks is considered. An operator observes a plant through a natural …
Identification of system vulnerability under a smart sensor attack via attack model reduction
In this letter, we investigate how to make use of model reduction techniques to identify the
vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite …
vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite …
Synthesis of the supremal covert attacker against unknown supervisors by using observations
In this article, we consider the problem of synthesizing the supremal covert damage-
reachable attacker, in the setup where the model of the supervisor is unknown to the …
reachable attacker, in the setup where the model of the supervisor is unknown to the …
On decidability of existence of fortified supervisors against covert actuator attackers
This work investigates the existence of fortified supervisors against covert actuator attackers.
For a supervisor that is nonresilient against covert actuator attackers, a fortified supervisor …
For a supervisor that is nonresilient against covert actuator attackers, a fortified supervisor …