Ubiquity of embedded computers and network connectivity have made control systems vulnerable to potential cyber-attacks. This has become a relevant problem after real-world cyber-security breaches targeting automation equipment, and notable research effort has been made in order to model such attacks and to render these systems more secure. However, particularly resourceful agents can design attacks that cannot be detected by existing monitoring system, and are therefore called stealthy. In this work, we address the case when these attacks are deployed on part of a Large-Scale System (LSS), which can be partitioned into a collection of Linear Time Invariant (LTI) systems. We provide a local characterisation of stealthy attacks for LSSs, inc...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
This paper develops a glocal (global-local) attack detection framework to detect stealthy cyber-phys...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
In a cyber-physical system, security problems are of vital importance as the failure of such system ...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
This paper develops a glocal (global-local) attack detection framework to detect stealthy cyber-phys...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...