1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are characterized in general terms by means of a misleading relation. The notion of attack alphabet is introduced and attack words are defined to describe how observations can be corrupted by the attacker. On this alphabet two different observers are constructed: they describe the different state estimates computed by the attacker and by the operator for each corrupted observation. A formal procedure to design a supremal stealthy joint subestimator is presented. This structure, constructed refining the concurrent composition of the two observers, is guaranteed to describe all stealthy attacks. The supremal stealthy joint subestimator allows one ...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
In this letter, we investigate how to make use of model reduction techniques to identify the vulnera...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-a...
We consider a multi-adversary version of the supervisory control problem for discrete-event systems ...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
In this work, we investigate the problem of covert attacker synthesis for supervisory control of di...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
In this letter, we investigate how to make use of model reduction techniques to identify the vulnera...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-a...
We consider a multi-adversary version of the supervisory control problem for discrete-event systems ...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
In this work, we investigate the problem of covert attacker synthesis for supervisory control of di...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure s...
As more attention is paid to security in the context of control systems and as attacks occur to real...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
In this letter, we investigate how to make use of model reduction techniques to identify the vulnera...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...