This paper presents a zonotopic set-invariance analysis of replay attacks affecting the communication network that serves the supervisory layer of complex control systems using an observer-based detection scheme. Depending on the attacker's access to the system's resources, two scenarios are considered: (I) Sensors and controller data are counterfeited; (II) Only sensor measurements are counterfeited. The effect of a physical attack against the plant during the data replay is also taken into consideration. The representation of invariant sets as zonotopes allows to derive analytical expressions for attack detectability under the presence of bounded uncertainties. The validity of the analysis is demonstrated through simulations using a quadr...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
This paper addresses the problem of replay attack detection in autonomous vehicles. Due to the stron...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
This paper presents a zonotopic set-invariance analysis of replay attacks affecting the communicatio...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
This paper studies detection of replay attacks on networked control systems, assuming that the actua...
Ensuring security of systems based on supervisory control and data acquisition is a major challenge....
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the prop...
© 2020. The AuthorsThis paper presents the design of an input sequence in order to actively guarante...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
In this paper, a threat discrimination methodology is proposed for cyber-physical systems with event...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
Abstract—This technical note studies a resilient control problem for dis-crete-time, linear time-inv...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
This paper addresses the problem of replay attack detection in autonomous vehicles. Due to the stron...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...
This paper presents a zonotopic set-invariance analysis of replay attacks affecting the communicatio...
This paper investigates the security issue of the data replay attacks on the control systems. The at...
This paper studies detection of replay attacks on networked control systems, assuming that the actua...
Ensuring security of systems based on supervisory control and data acquisition is a major challenge....
This paper analyzes the injection of finite sequences as a physical watermarking method for the dete...
This paper explores a new method for detecting cyber-attacks on a controller. Specifically, the prop...
© 2020. The AuthorsThis paper presents the design of an input sequence in order to actively guarante...
This article investigates the distributed secure state estimation problem for cyber-physical systems...
This paper considers the problem of set-based state estimation for linear time-invariant (LTI) syste...
In this paper, a threat discrimination methodology is proposed for cyber-physical systems with event...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
Abstract—This technical note studies a resilient control problem for dis-crete-time, linear time-inv...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
This paper addresses the problem of replay attack detection in autonomous vehicles. Due to the stron...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As oppose...