Bibliographical review on cyber attacks from a control oriented perspective
This paper presents a bibliographical review of definitions, classifications and applications
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …
concerning cyber attacks in networked control systems (NCSs) and cyber-physical systems …
Denial-of-service power dispatch against linear quadratic control via a fading channel
This paper addresses the secure control problem of cyber-physical systems (CPSs) under
Denial-of-Service (DoS) attack with power constraint. The purpose of the attacker is to …
Denial-of-Service (DoS) attack with power constraint. The purpose of the attacker is to …
False data injection attack for cyber-physical systems with resource constraint
F Li, Y Tang - IEEE transactions on cybernetics, 2018 - ieeexplore.ieee.org
Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since
CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one …
CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one …
DoS attack in centralised sensor network against state estimation
C Yang, W Yang, H Shi - IET Control Theory & Applications, 2018 - Wiley Online Library
This study considers a model that a centralised sensor network is attacked by an invader,
who launches the denial‐of‐service (DoS) attack on the network. To understand the …
who launches the denial‐of‐service (DoS) attack on the network. To understand the …
A secure strategy for a cyber physical system with multi-sensor under linear deception attack
C Wang, J Huang, D Wang, F Li - Journal of the Franklin Institute, 2021 - Elsevier
Linear deception attacks can bypass the χ 2 detector by tampering with data. In this paper,
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …
Resilient control for wireless networked control systems under DoS attack via a hierarchical game
H Yuan, Y Xia, H Yang, Y Yuan - International Journal of …, 2018 - Wiley Online Library
In this paper, the resilient control problem is investigated for a wireless networked control
system (WNCS) under denial‐of‐service (DoS) attack via a hierarchical game approach. In …
system (WNCS) under denial‐of‐service (DoS) attack via a hierarchical game approach. In …
Optimal linear attack for multi-sensor network against state estimation
T Li, Z Wang, C Huang, H Zhang - Journal of the Franklin Institute, 2022 - Elsevier
This paper is concerned with a security problem about malicious integrity attacks in state
estimation system, in which multiple smart sensors locally measure information and transmit …
estimation system, in which multiple smart sensors locally measure information and transmit …
A survey on the recent development of securing the networked control systems
Q Wang, H Yang - Systems Science & Control Engineering, 2019 - Taylor & Francis
Recent years witness an ever-increasing research interest in the study of securing the
Networked Control Systems due mainly to the trend of integrating the advanced …
Networked Control Systems due mainly to the trend of integrating the advanced …
Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game
This article studies the optimal distributed denial-of-service attack strategy for cyber–
physical systems with multiple attackers and multiple defenders. An advanced attack …
physical systems with multiple attackers and multiple defenders. An advanced attack …
Optimal FDI and DoS attacks on CPSs with energy constraint
To have a good understanding of attackers' behaviour and seek effective defensive
measures, an optimal strategy of false data injection (FDI) and denial-of-service (DoS) …
measures, an optimal strategy of false data injection (FDI) and denial-of-service (DoS) …