This work considers the problem of detecting corrupted components in a large scale decentralized system via local model information. The electric power system, the transportation system, and generally any computer or network system are examples of large scale systems for which external (cyber) attacks have become an important threat. We consider the case of linear networks, and we model a cyber attack as an exogenous input that compromises the behavior of a set of components. We exploit two distributed methods that rely on two different sets of assumptions to achieve detection and identification. The first method takes advantage of the presence in the network of weakly interconnected subparts, it requires limited knowledge of the network mo...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The expansion of power systems over large geographical areas renders centralized processing ineffici...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Abstract — This work considers the problem of detecting corrupted components in a large scale decent...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
Abstract — Future power grids will be required to operate safely and reliably against cyber-physical...
Future power networks will be characterized by safe and reliable functionality against physical malf...
Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The expansion of power systems over large geographical areas renders centralized processing ineffici...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Abstract — This work considers the problem of detecting corrupted components in a large scale decent...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
Abstract — Future power grids will be required to operate safely and reliably against cyber-physical...
Future power networks will be characterized by safe and reliable functionality against physical malf...
Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The expansion of power systems over large geographical areas renders centralized processing ineffici...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...