\u3cp\u3eIn this paper, we propose and develop an actuator attack model for discrete-event systems. We assume the actuator attacker partially observes the execution of the closed-loop system and eavesdrops the control commands issued by the supervisor. The attacker can modify each control command on a specified subset of attackable events. The goal of the actuator attacker is to remain covert until it can establish a successful attack and lead the attacked closed-loop system into generating certain damaging strings. We then present a characterization for the existence of a successful attacker and prove the existence of the supremal successful attacker, when both the supervisor and the attacker are normal. Finally, we present an algorithm to...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
Cyber-attack models and strategies for their mitigation have been studied recently in a deterministi...
In this paper, we propose and develop an actuator attack model for discrete-event systems. We assume...
In this work, we investigate the problem of covert attacker synthesis for supervisory control of di...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
This work investigates the problem of synthesizing obfuscated supervisors against covert actuator at...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
We consider a multi-adversary version of the supervisory control problem for discrete-event systems ...
The feedback control system with network-connected components is vulnerable to cyberattacks. We stud...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
This work introduces an approach for the synthesis of optimal covert sensor–actuator attackers in th...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
Cyber-attack models and strategies for their mitigation have been studied recently in a deterministi...
In this paper, we propose and develop an actuator attack model for discrete-event systems. We assume...
In this work, we investigate the problem of covert attacker synthesis for supervisory control of di...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
This work investigates the problem of synthesizing obfuscated supervisors against covert actuator at...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
We consider a multi-adversary version of the supervisory control problem for discrete-event systems ...
The feedback control system with network-connected components is vulnerable to cyberattacks. We stud...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
This work introduces an approach for the synthesis of optimal covert sensor–actuator attackers in th...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
Cyber-attack models and strategies for their mitigation have been studied recently in a deterministi...