The problem of mitigating maliciously injected signals in interconnected systems is dealt with in this paper. We consider the class of covert attacks, as they are stealthy and cannot be detected by conventional means in centralized settings. Distributed architectures can be leveraged for revealing these stealthy attacks by exploiting communication and local model knowledge. We show how such detection schemes can be improved to estimate the action of an attacker and we propose an accommodation scheme in order to mitigate or neutralize abnormal behavior of a system under attack.2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/r...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
Ubiquity of embedded computers and network connectivity have made control systems vulnerable to pote...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
Ubiquity of embedded computers and network connectivity have made control systems vulnerable to pote...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...