This article investigates the distributed secure state estimation problem for cyber-physical systems under replay attacks. The main purpose is to design the distributed observers such that the estimation error system is stable. First, a detection algorithm is proposed to not only expose the behavior of the attacker but also identify which sensor is tampered. Then, the distributed observers are designed and the adverse effects are eliminated. Moreover, in view of the linear matrix inequality technique, a sufficient condition is presented, which ensures that the estimation error system is stable and achieves an $H_{\infty }$ property. Finally, a practical inverted pendulum example is employed to elaborate the effectiveness and superiority of ...
As the application of cyber-physical systems (CPSs) becomes more and more widespread, its security i...
In this paper, we investigate the finite time attack detection and secure state estimation problem f...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
In this paper, we investigate the distributed secure state estimation and control problems for inter...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
State estimation plays an essential role in the monitoring and supervision of cyber-physical systems...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This article studies the static output feedback (SOF) secure control issue for cyber-physical system...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of e...
This paper presents a distributed attack-resilient state estimation scheme for continuous-time linea...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
As the application of cyber-physical systems (CPSs) becomes more and more widespread, its security i...
In this paper, we investigate the finite time attack detection and secure state estimation problem f...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
In this paper, we investigate the distributed secure state estimation and control problems for inter...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
State estimation plays an essential role in the monitoring and supervision of cyber-physical systems...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This article studies the static output feedback (SOF) secure control issue for cyber-physical system...
This paper considers security issues of a cyber-physical system (CPS) under denial-of-service (DoS) ...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...
We consider security issues in remote state estimation of cyber-physical systems in this chapter. We...
Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of e...
This paper presents a distributed attack-resilient state estimation scheme for continuous-time linea...
<p>A SCADA system employing the distributed networks of sensors and actuators that interact with the...
As the application of cyber-physical systems (CPSs) becomes more and more widespread, its security i...
In this paper, we investigate the finite time attack detection and secure state estimation problem f...
This paper addresses the problem of detection and reconstruction of cyber-attacks corrupting states ...