This paper studies an approach for detecting cyber attacks against networked cooperative systems (NCS) that are assumed to be working in a cyber-physical environment. NCS are prone to anomalies both due to cyber and physical attacks and faults. Cyber-attacks being more hazardous given the cooperative nature of the NCS may lead to disastrous consequences and thus need to be detected as soon as they occur by all systems in the network. Our approach deals with two types of malicious attacks aimed at compromising the stability of the NCS: intrusion attacks/local malfunctions on individual systems and deception/cyber-attacks on the communication between the systems. In order to detect and identify such attacks under switching communication topol...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
A Cyber-physical system (CPS) is a complex system embedding advanced computation, communication and ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
This paper studies an approach for detecting cyber attacks against networked cooperative systems (NC...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Multi-Agent Systems (MASs) have attracted much popularity, since the previous decade due to their po...
This paper considers a cooperative control problem in presence of unknown attacks. The attacker aims...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
There is a growing interest towards Cyber-Physical Systems (CPSs) due to their wide range of applica...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on ...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
A Cyber-physical system (CPS) is a complex system embedding advanced computation, communication and ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
This paper studies an approach for detecting cyber attacks against networked cooperative systems (NC...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Multi-Agent Systems (MASs) have attracted much popularity, since the previous decade due to their po...
This paper considers a cooperative control problem in presence of unknown attacks. The attacker aims...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
There is a growing interest towards Cyber-Physical Systems (CPSs) due to their wide range of applica...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on ...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
A Cyber-physical system (CPS) is a complex system embedding advanced computation, communication and ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...