This paper deals with a topology for a class of interconnected systems, referred to as a highly interconnected system, consisting of interconnected plants and local controllers. We address the respective cyber attack surfaces as well as a design approach for detection and isolation of covert cyber attacks. For each pair of plant and controller, a cyber attack is implemented by a malicious agent, and its detection and isolation are achieved by associating the controller with two observers. These observers estimate the states of the plant, and compare the estimated states to determine if a neighbouring plant is under a covert cyber attack. The paper presents the modelling of the topology, the analysis of the covertness of cyber attacks, the d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Modern dynamical systems are large and inevitably comprise dierent subsystemsthat are often integrat...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Ubiquity of embedded computers and network connectivity have made control systems vulnerable to pote...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Modern dynamical systems are large and inevitably comprise dierent subsystemsthat are often integrat...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
This thesis project investigates the cyber-security problem for linear interconnected systems in a d...
4siDistributed detection of covert attacks for linear large-scale interconnected systems is address...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
Distributed detection of covert attacks for linear large-scale interconnected systems is addressed i...
The problem of covert attacks detection in a network of interconnected subsystems is addressed in th...
The paper deals with the key problem of detecting cyber-attacks in the context of large-scale system...
The design of a distributed architecture for the detection of covert attacks in interconnected Cyber...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Abstract—Networked control systems under certain cyber attacks are analyzed. The communication netwo...
Ubiquity of embedded computers and network connectivity have made control systems vulnerable to pote...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for d...
Modern dynamical systems are large and inevitably comprise dierent subsystemsthat are often integrat...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...