Articles with "attack strategy" as a keyword



Stochastic Data-Based Denial-of-Service Attack Strategy Design Against Remote State Estimation in Interval Type-2 T–S Fuzzy Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Fuzzy Systems"

DOI: 10.1109/tfuzz.2022.3189394

Abstract: This article focuses on designing a novel stochastic data-based denial-of-service (DoS) attack strategy that can intercept measurements and reduce the quality of remote state estimation in interval type-2 (IT2) T–S fuzzy systems. The new proposed… read more here.

Keywords: stochastic data; attack; attack strategy; data based ... See more keywords
Photo from wikipedia

Piecewise Attack Strategy Design for T–S Fuzzy Cyber–Physical Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"

DOI: 10.1109/tsmc.2022.3146282

Abstract: This article is concerned with the problem of the stealth attack strategy design for T–S fuzzy cyber–physical systems (CPSs). Virtual systems that reflect the attacker’s target are established, in which the parameter matrices of virtual… read more here.

Keywords: strategy design; design fuzzy; strategy; fuzzy cyber ... See more keywords