In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy join...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
This paper is concerned with the security issue in the state estimation problem for a networked cont...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-a...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
In a cyber-physical system, there are potential sources of malicious attacks that can damage the est...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
This paper is concerned with the security issue in the state estimation problem for a networked cont...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
This paper addresses the problem of cyber-attacks in discrete-event systems framework. Labeled finit...
The development of cyber-physical systems (CPS) has brought much attention of researchers to cyber-a...
International audienceStealthy attacks on the sensors and actuators embedded in cyber-physical syste...
In a cyber-physical system, there are potential sources of malicious attacks that can damage the est...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
In this technical note, the trade-off between the attack detectability and the performance degradati...
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2019Catal...
Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiMany critical infrastructures rely...
AbstractWe consider the problem of generating sensor spoofing attacks on feedback controllers. The a...
Motivated by the attacks on control systems through the cyber (digital) part, we study how signal at...
This paper is concerned with the security issue in the state estimation problem for a networked cont...
While attacks on information systems have for most prac- tical purposes binary outcomes (informa...