Articles with "stealthy attack" as a keyword



Photo from wikipedia

Statistical-Based Optimal $\epsilon$-Stealthy Attack Under Stochastic Communication Protocol: An Application to Networked Permanent Magnet Synchronous Machine Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Electronics"

DOI: 10.1109/tie.2022.3156147

Abstract: This article presents the $\epsilon$-stealthy attack against cyber-physical systems under the stochastic communication protocol (SCP), which is used to avoid data collisions. The aim is to develop an optimal attack strategy to degrade the estimation… read more here.

Keywords: stealthy attack; communication protocol; networked permanent; epsilon stealthy ... See more keywords
Photo from wikipedia

Resilient Distributed State Estimation Under Stealthy Attack

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3202119

Abstract: Network security issues are significant for cyber-physical systems while existing wireless networks are vulnerable to cyber-attacks. This paper proposes a novel detector for stealthy attacks in distributed consensus-based filtering, which has fewer objects to detect… read more here.

Keywords: stealthy attack; state estimation; distributed state; detector ... See more keywords