International audienceBased on the traditional linear algebra theory, this paper propose the attack detection schemes for networked control systems (NCSs) under single stochastic cyber-attack and multiple stochastic cyber-attacks aiming at multiple communication channels of NCSs, respectively. The focus is on designing an anomaly detector for NCSs under cyber-attacks. First, we construct a model of stochastic NCSs with stochastic cyber-attacks which satisfy the Markovian stochastic process. And we also introduced the stochastic attack models that NCSs are possibly exposed to. Next, based on the frequency-domain transformation technique and linear algebra theory, we propose the algebraic detection schemes for possible stochastic cyber-attack...
Networked control systems (NCSs) are considered as a special form of cyber-physical systems (CPS) wh...
International audienceSoftware Defined Networking (SDN) is a networking architecture within the cont...
peer reviewedThis paper explores a new method for detecting cyber-attacks on a controller. Specifica...
Based on the traditional linear algebra theory, this paper propose the attack detection schemes for ...
peer reviewedBased on the traditional linear algebra theory, this paper propose the attack detection...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
In order to compromise a target control system successfully, hackers possibly attempt to launch mult...
peer reviewedIn order to compromise a target control system successfully, hackers possibly attempt t...
peer reviewedIn order to compromise a target control system successfully, hackers possibly attempt t...
We study the problem of detecting an attack on a stochastic cyber-physical system. We aim to treat t...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
In the present paper, a networked control system under both cyber and physical attacks is considered...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the prop...
Networked control systems (NCSs) are considered as a special form of cyber-physical systems (CPS) wh...
International audienceSoftware Defined Networking (SDN) is a networking architecture within the cont...
peer reviewedThis paper explores a new method for detecting cyber-attacks on a controller. Specifica...
Based on the traditional linear algebra theory, this paper propose the attack detection schemes for ...
peer reviewedBased on the traditional linear algebra theory, this paper propose the attack detection...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
In order to compromise a target control system successfully, hackers possibly attempt to launch mult...
peer reviewedIn order to compromise a target control system successfully, hackers possibly attempt t...
peer reviewedIn order to compromise a target control system successfully, hackers possibly attempt t...
We study the problem of detecting an attack on a stochastic cyber-physical system. We aim to treat t...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
In the present paper, a networked control system under both cyber and physical attacks is considered...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the prop...
Networked control systems (NCSs) are considered as a special form of cyber-physical systems (CPS) wh...
International audienceSoftware Defined Networking (SDN) is a networking architecture within the cont...
peer reviewedThis paper explores a new method for detecting cyber-attacks on a controller. Specifica...