The problem of covert attacks detection in a network of interconnected subsystems is addressed in this paper. Existing approaches in the area of covert attacks detection have been devoted to centralized systems and are mainly based on mismatch between the attacker's model and the actual plant. Instead, in this paper, we consider a large-scale system where the attacker has full knowledge on the subsystems models. By using the information received from neighboring subsystems and by exploiting the mismatch between a distributed Luenberger observer and a decentralized unknown input observer, we propose a local detection strategy allowing each subsystem to detect anomalies in its neighborhood. The effectiveness of the proposed strategy is shown ...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Abstract. Today networks suffer from various challenges like distributed denial of service attacks o...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Abstract. Today networks suffer from various challenges like distributed denial of service attacks o...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
This paper deals with a topology for a class of interconnected systems, referred to as a highly inte...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
DC microgrids often present a hierarchical control architecture, requiring integration of communicat...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Abstract. Today networks suffer from various challenges like distributed denial of service attacks o...