Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3160531
Abstract: The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat. Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniques even at…
read more here.
Keywords:
stealthy attacks;
responding targeted;
malware;
evidence ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Robotics and Automation Letters"
DOI: 10.1109/lra.2023.3250007
Abstract: This letter deals with the vulnerability analysis of cyber-physical systems subject to malicious actions. For this purpose, the considered system is assumed to be abstracted as a discrete event system. Labeled finite automata with inputs…
read more here.
Keywords:
stealthy attacks;
system;
finite automata;
labeled finite ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2020.2987307
Abstract: In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, output…
read more here.
Keywords:
system;
resp strictly;
cyber physical;
physical system ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2022.3195922
Abstract: In this article, we consider a game-theoretic framework for cyber-physical systems, where a defender develops a mitigation strategy against an intelligent attacker who exploits the system's uncertainty to remain undetected. The goal of the defender…
read more here.
Keywords:
stealthy attacks;
system;
horizon control;
receding horizon ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE transactions on cybernetics"
DOI: 10.1109/tcyb.2020.3025307
Abstract: This article studies the reachable set of cyber-physical systems subject to stealthy attacks with the Kullback-Leibler divergence adopted to describe the stealthiness. The reachable set is defined as the set in which both the system…
read more here.
Keywords:
physical systems;
reachable set;
cyber physical;
reachability analysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3206419
Abstract: This paper focuses on designing measurement-based optimal stealthy attacks for linear cyber-physical systems (CPSs), where attackers aim to deteriorate the performance of remote state estimation and keep $\epsilon $ -stealthy to Kullback-Leibler divergence detector. Instead…
read more here.
Keywords:
stealthy attacks;
remote state;
state estimation;
based optimal ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2020.3048791
Abstract: With the rapid evolution of the industrial Internet, cloud service has emerged as a next-generation industrial standard that has the potential to revolutionize and transform the enterprise industry. In recent years, numerous enterprises have acknowledged…
read more here.
Keywords:
memory introspection;
stealthy attacks;
introspection based;
introspection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "EURASIP Journal on Wireless Communications and Networking"
DOI: 10.1186/s13638-019-1389-1
Abstract: With the integration of the modern industrial control systems (ICS) with the Internet technology, ICS can make full use of the rich resources on the Internet to facilitate remote process control. However, every coin has…
read more here.
Keywords:
control systems;
control;
industrial control;
stealthy attacks ... See more keywords