In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equipped with a Model Predictive Controller, where the feedback loop is closed over a non-ideal network, and the process is subject to a random Gaussian disturbance. We adopt a model-based approach in order to detect anomalies, formalizing the problem as a binary hypothesis test. The proposed approach exploits the analytical redundancy obtained by computing partially overlapping nominal system trajectories over a temporal sliding window, and propagating the disturbance distributions along them. The recorded data over such window is then used to define a probabilistic consistency index at each time step in order to make a decision about the presen...
In this manuscript, we present a detailed case study about model-based attack detection procedures f...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
International audienceUnder the networked control paradigm, controllers , sensors, and actuators are...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
International audienceSoftware Defined Networking (SDN) is a networking architecture within the cont...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
The paper presents a new approach for control security. Specifically, cyber-attacks on the controller...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
Distributed model predictive control (DMPC) schemes have become a popular choice for networked contr...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
Networked control systems (NCSs) are considered as a special form of cyber-physical systems (CPS) wh...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
Under the networked control paradigm, controllers, sensors, and actuators are different devices that...
Abstract — This work considers the problem of detecting corrupted components in a large scale decent...
In this manuscript, we present a detailed case study about model-based attack detection procedures f...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
International audienceUnder the networked control paradigm, controllers , sensors, and actuators are...
In this preliminary work, we consider the problem of detecting cyber-attacks in a linear system equi...
International audienceSoftware Defined Networking (SDN) is a networking architecture within the cont...
International audienceBased on the traditional linear algebra theory, this paper propose the attack ...
The paper presents a new approach for control security. Specifically, cyber-attacks on the controller...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
Distributed model predictive control (DMPC) schemes have become a popular choice for networked contr...
peer reviewedThe paper presents a new approach for control security. Specifically, cyber-attacks on ...
Networked control systems (NCSs) are considered as a special form of cyber-physical systems (CPS) wh...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
Under the networked control paradigm, controllers, sensors, and actuators are different devices that...
Abstract — This work considers the problem of detecting corrupted components in a large scale decent...
In this manuscript, we present a detailed case study about model-based attack detection procedures f...
This work considers the problem of detecting corrupted components in a large scale decentralized sys...
International audienceUnder the networked control paradigm, controllers , sensors, and actuators are...