In this work, we investigate the problem of covert attacker synthesis for supervisory control of discrete-event systems. In particular, we consider attackers that exercise both actuator attacks and sensor attacks, where the (partial-observation) attackers may or may not eavesdrop the control commands issued by the supervisor. We develop a reduction from the covert attacker synthesis problem to the Ramadge-Wonham supervisor synthesis problem, which generalizes our previous work on a reduction based approach for covert actuator attacker synthesis.Ministry of Education (MOE)National Research Foundation (NRF)Published versionThis work is financially supported by Singapore Ministry of Education Tier 1 Academic Research Grant (2018-T1-001-24...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
The feedback control system with network-connected components is vulnerable to cyberattacks. We stud...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...
This work introduces an approach for the synthesis of optimal covert sensor–actuator attackers in th...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
\u3cp\u3eIn this paper, we propose and develop an actuator attack model for discrete-event systems. ...
This work investigates the problem of synthesizing obfuscated supervisors against covert actuator at...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
We consider a multi-adversary version of the supervisory control problem for discrete-event systems ...
This paper investigates the synthesis of successful sensor deception attack functions in supervisory...
In this letter, we investigate how to make use of model reduction techniques to identify the vulnera...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
Over the past decades, human dependability on technical devices has rapidlyincreased. Many activitie...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
The feedback control system with network-connected components is vulnerable to cyberattacks. We stud...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...
This work introduces an approach for the synthesis of optimal covert sensor–actuator attackers in th...
International audienceWe consider feedback control systems where sensor readings may be compromised ...
International audienceWe consider feedback control systems where sensor readings and actuator comman...
\u3cp\u3eIn this paper, we propose and develop an actuator attack model for discrete-event systems. ...
This work investigates the problem of synthesizing obfuscated supervisors against covert actuator at...
1. Chapter 3. The problem of state estimation under sensor attack is formalized; harmful attacks are...
One of the major challenges about cyber–physical systems is how to protect system integrity from cyb...
We consider a multi-adversary version of the supervisory control problem for discrete-event systems ...
This paper investigates the synthesis of successful sensor deception attack functions in supervisory...
In this letter, we investigate how to make use of model reduction techniques to identify the vulnera...
In this paper we consider the problem of joint state estimation under attack in partially-observed d...
Over the past decades, human dependability on technical devices has rapidlyincreased. Many activitie...
The problem of stealthy attacks for partially-observed discrete event systems is considered. An oper...
The feedback control system with network-connected components is vulnerable to cyberattacks. We stud...
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due...