A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying faulty/falsified sensor measurements. First, given the system dynamics, the authors derive tools for tuning the CUSUM procedure in the fault/attack-free case to fulfil the desired detection performance (in terms of false alarm rate). They use the widely-used chi-squared fault/attack detection procedure as a benchmark to compare the performance of the CUSUM. In particular, they characterise the state degradation that a class of attacks can induce the system while enforcing that the detectors (CUSUM and chi-squared) do not raise alarms. In doing so, they find the upper bound of state degradation that is possible by an undetected attacker. They quantify th...
International audienceThis paper addresses the problem of detecting cyber/physical attacks on Superv...
The problem of detecting linear attacks on industrial systems is presented in this paper. The object...
The problem of detecting linear attacks on industrial systems is presented in this paper. The object...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying faulty/fals...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measuremen...
International audienceThis paper addresses the problem of detecting cyber/physical attacks on Superv...
The problem of detecting linear attacks on industrial systems is presented in this paper. The object...
The problem of detecting linear attacks on industrial systems is presented in this paper. The object...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying faulty/fals...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
A vector-valued model-based cumulative sum (CUSUM) procedure is proposed for identifying falsified s...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
In the context of sensor attacks on linear time-invariant cyber-physical systems, we propose a model...
A model-based windowed chi-squared procedure is proposed for identifying falsified sensor measuremen...
International audienceThis paper addresses the problem of detecting cyber/physical attacks on Superv...
The problem of detecting linear attacks on industrial systems is presented in this paper. The object...
The problem of detecting linear attacks on industrial systems is presented in this paper. The object...