The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically, we consider a system where a remote estimator receives the data packet sent by a sensor over a wireless network at each time instant, and an energy-constrained attacker that cannot launch DoS attacks all the time designs the optimal DoS attack scheduling to maximize the attacking effect on the remote estimation performance. Most of the existing works concerning DoS attacks focus on the ideal scenario in which data packets can be received successfully if there is no DoS attack. To capture the unreliability nature of practical networks, we study the packet-dropp...
In this article, we study communication-constrained networked control problems for linear time-invar...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
Denial-of-Service (DoS) is a computer security problem that poses a serious challenge totrustworthin...
We consider a scenario in which a DoS attacker with the limited power resource and the purpose of de...
We consider the joint design of control and scheduling under stochastic Denial-of-Service (DoS) atta...
This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measur...
This paper studies the Denial-of-Service (DoS) attack power allocation issue, which aims to aggravat...
This paper addresses the secure control problem of cyber-physical systems (CPSs) under Denial-of-Ser...
In this paper, the security issue of cache-enabled wireless networks is considered, where data trans...
Network performance always dependent on the perfect flow of the data processing packets in network b...
Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it ...
International audienceNew Radio Vehicle-to-Everything (NR-V2X) distributed communication mode utiliz...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...
In this article, we study communication-constrained networked control problems for linear time-invar...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
Denial-of-Service (DoS) is a computer security problem that poses a serious challenge totrustworthin...
We consider a scenario in which a DoS attacker with the limited power resource and the purpose of de...
We consider the joint design of control and scheduling under stochastic Denial-of-Service (DoS) atta...
This paper considers a cyber-physical system (CPS) under denial-of-service (DoS) attacks. The measur...
This paper studies the Denial-of-Service (DoS) attack power allocation issue, which aims to aggravat...
This paper addresses the secure control problem of cyber-physical systems (CPSs) under Denial-of-Ser...
In this paper, the security issue of cache-enabled wireless networks is considered, where data trans...
Network performance always dependent on the perfect flow of the data processing packets in network b...
Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it ...
International audienceNew Radio Vehicle-to-Everything (NR-V2X) distributed communication mode utiliz...
In order to be resilient to attacks, a cyber-physical system (CPS) must be able to detect attacks be...
This letter studies remote state estimation under denial-of-service (DoS) attacks. A sensor transmit...
In this dissertation, we focus on the security and reliability of wireless sensor networks (WSNs). W...
In this article, we study communication-constrained networked control problems for linear time-invar...
We consider remote state estimation of cyberphysical systems under signal-to-interference-plus-noise...
Denial-of-Service (DoS) is a computer security problem that poses a serious challenge totrustworthin...