This thesis project investigates the cyber-security problem for linear interconnected systems in a distributed fashion. Starting from existing results on the detectability of covert cyber-attacks in a single agent of the network, the work addresses the isolation task, proposing different algorithms based on the algebraic properties of the interconnection matrices of each local neighborhood. Moreover, the detection problem is extended to the scenario of multiple agents simultaneously attacked. The whole theoretical analysis focuses on large-scale systems subject to bounded process and measurement disturbances. All the proposed methodologies can be implemented by using only local information available at each subsystem, and are endowed with a...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
Abstract — This work considers the problem of detecting corrupted components in a large scale decent...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
Abstract — This work considers the problem of detecting corrupted components in a large scale decent...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...