We study the problem of detecting an attack on a stochastic cyber-physical system. We aim to treat the problem in its most general form. We start by introducing the notion of asymptotically detectable attacks, as those attacks introducing changes to the system's output statistics which persist asymptotically. We then provide a necessary and sufficient condition for asymptotic detectability. This condition preserves generality as it holds under no restrictive assumption on the system and attacking scheme. To show the importance of this condition, we apply it to detect certain attacking schemes which are undetectable using simple statistics. Our necessary and sufficient condition naturally leads to an algorithm which gives a confidence level ...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
peer reviewedBased on the traditional linear algebra theory, this paper propose the attack detection...
Based on the traditional linear algebra theory, this paper propose the attack detection schemes for ...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
In this technical note, the trade-off between the attack detectability and the performance degradati...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled ...
International audienceThis paper addresses the problem of detecting cyber/physical attacks on Superv...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
peer reviewedBased on the traditional linear algebra theory, this paper propose the attack detection...
Based on the traditional linear algebra theory, this paper propose the attack detection schemes for ...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
In this technical note, the trade-off between the attack detectability and the performance degradati...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
peer reviewedBased on frequency-domain transformation technique, this paper proposes an attack detec...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled ...
International audienceThis paper addresses the problem of detecting cyber/physical attacks on Superv...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
Cyber-Physical Systems (CPS) offer close integration among computational elements, communication net...
In this paper, we analyze the vulnerabilities due to integrity cyber attacks named zero-stealthy att...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Cyber-physical systems (CPS) face tremendous threats in modern society. Indeed their presence incrit...
peer reviewedBased on the traditional linear algebra theory, this paper propose the attack detection...
Based on the traditional linear algebra theory, this paper propose the attack detection schemes for ...