International audienceFalse data injection is an attack in which an attacker injects fabricated data into a system with the objective to change the behaviour and the decision-making of the system. Many industrial data-based devices are vulnerable to such attacks, this work presents an approach for testing False Data Injection Attack. This approach uses a Domain-Specific Language to generate altered data with two objectives, to provide sophisticated attacks scenarios to increase the resilience of vulnerable systems against False Data Injection Attack and to train detection tools
The introduction of the smart grid allows utility companies to leverage the residential demand flexi...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
In this paper, we examine the factors that influence the success of false data injection (FDI) attac...
International audienceFalse data injection is an attack in which an attacker injects fabricated data...
Explore and understand the problem of constructing false data injection attacks from the adversary...
International audienceSeveral works are aiming to develop techniques allowing detecting False Data I...
With rapid advances in sensor, computer and communication networks, modern power systems have become...
L'internet des objets (IoT) est aujourd'hui omniprésent dans toutes les sphères de la vie. Ses appli...
International audienceWithin aircraft communication, due to the unauthentication and unencryption of...
The accurately estimated state is of great importance for maintaining a stable running condition of ...
False Data Injection Attack (FDIA) is an attack that could compromise Advanced Metering Infrastructu...
International audienceThe ADS-B --- Automatic Dependent Surveillance Broadcast --- technology requir...
Static security assessment (SSA) is an important procedure to ensure the static security of the powe...
International audienceFault injection is a well known method to test the robustness and security vul...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
The introduction of the smart grid allows utility companies to leverage the residential demand flexi...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
In this paper, we examine the factors that influence the success of false data injection (FDI) attac...
International audienceFalse data injection is an attack in which an attacker injects fabricated data...
Explore and understand the problem of constructing false data injection attacks from the adversary...
International audienceSeveral works are aiming to develop techniques allowing detecting False Data I...
With rapid advances in sensor, computer and communication networks, modern power systems have become...
L'internet des objets (IoT) est aujourd'hui omniprésent dans toutes les sphères de la vie. Ses appli...
International audienceWithin aircraft communication, due to the unauthentication and unencryption of...
The accurately estimated state is of great importance for maintaining a stable running condition of ...
False Data Injection Attack (FDIA) is an attack that could compromise Advanced Metering Infrastructu...
International audienceThe ADS-B --- Automatic Dependent Surveillance Broadcast --- technology requir...
Static security assessment (SSA) is an important procedure to ensure the static security of the powe...
International audienceFault injection is a well known method to test the robustness and security vul...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
The introduction of the smart grid allows utility companies to leverage the residential demand flexi...
Part 9: Intrusion DetectionInternational audienceThe most common anomaly detection mechanisms at app...
In this paper, we examine the factors that influence the success of false data injection (FDI) attac...