Articles with "stealthy output" as a keyword



Photo from wikipedia

Stealthy output injection attacks on control systems with bounded variables

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Control"

DOI: 10.1080/00207179.2016.1207099

Abstract: ABSTRACT As more and more critical infrastructures such as transportation, power systems and water are being embedded with sensing and control and linked to the Internet, the resulting security vulnerability can be exploited to inflict… read more here.

Keywords: systems bounded; injection attacks; control systems; stealthy output ... See more keywords