peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on the controller are investigated by means of optimization techniques in order to determine the worst-case scenario. Then, a novel attack detector based on limit checking is introduced. The particularity of this detector is that no specific controller knowledge is necessary. Hence, the vulnerability of the detector can be reduced since no reconfiguration is required (limited accessibility). Finally, the paper shows that the effect of the attacks on the system can be significantly mitigated by applying proper optimal control laws.R-AGR-0423-1 > C11/IS/1206050 : SESANET > 15/06/2012 - > VOOS Holge
In the present paper, a networked control system under both cyber and physical attacks is considered...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In this paper we consider a typical architecture for a networked control system under false-data inj...
The paper presents a new approach for control security. Specifically, cyber-attacks on the controller...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
In this thesis, the safety and security problems in Cyber-Physical Systems (CPSs) are addressed. In ...
This paper addresses the problem of detection and prevention of cyber attacks in discrete event syst...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
Abstract The literature regarding attacks in Networked Control Systems (NCS) indicates that covert a...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
peer reviewedThis paper explores a new method for detecting cyber-attacks on a controller. Specifica...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the prop...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
In the present paper, a networked control system under both cyber and physical attacks is considered...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In this paper we consider a typical architecture for a networked control system under false-data inj...
The paper presents a new approach for control security. Specifically, cyber-attacks on the controller...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
In this thesis, the safety and security problems in Cyber-Physical Systems (CPSs) are addressed. In ...
This paper addresses the problem of detection and prevention of cyber attacks in discrete event syst...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
Abstract The literature regarding attacks in Networked Control Systems (NCS) indicates that covert a...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
peer reviewedThis paper explores a new method for detecting cyber-attacks on a controller. Specifica...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the prop...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
With cyber-physical systems opening to the outside world, security can no longer be considered a sec...
In the present paper, a networked control system under both cyber and physical attacks is considered...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
In this paper we consider a typical architecture for a networked control system under false-data inj...