Movatterモバイル変換


[0]ホーム

URL:


Nguyen et al., 2023 - Google Patents

The ability to detect the linear attack of WL-CUSUM and FMA algorithms

Nguyen et al., 2023

ViewPDF
Document ID
3606622381115999136
Author
Nguyen D
Le M
Cung T
Publication year
Publication venue
Bulletin of Electrical Engineering and Informatics

External Links

Snippet

The problem of detecting linear attacks on industrial systems is presented in this paper. The object is attacked by linear attack is the wireless communication process from sensors to controller with simulated mathematical model (stochastic dynamical systems and random …
Continue reading atmail.beei.org (PDF) (other versions)

Similar Documents

PublicationPublication DateTitle
Shi et al.Causality countermeasures for anomaly detection in cyber-physical systems
Zhang et al.Decentralized false-data injection attacks against state omniscience: Existence and security analysis
Lo et al.Distributed model-based nonlinear sensor fault diagnosis in wireless sensor networks
Anwar et al.Stealthy and blind false injection attacks on SCADA EMS in the presence of gross errors
Lo et al.Distributed reference-free fault detection method for autonomous wireless sensor networks
Umsonst et al.Anomaly detector metrics for sensor data attacks in control systems
Basiri et al.Kalman filter based secure state estimation and individual attacked sensor detection in cyber-physical systems
US20190025435A1 (en)Cyber-physical system defense
Sun et al.Statistical resolution limit analysis of two closely spaced signal sources using Rao test
Huang et al.False phasor data detection under time synchronization attacks: A neural network approach
Nguyen et al.The ability to detect the linear attack of WL-CUSUM and FMA algorithms
Niu et al.Optimal Fault Detection for Stochastic Linear Time-Varying Systems by $\chi^{2} $ Test
Coluccia et al.A tunable W-ABORT-like detector with improved detection vs rejection capabilities trade-off
Bonczek et al.Detection of hidden attacks on cyber-physical systems from serial magnitude and sign randomness inconsistencies
Umsonst et al.A game-theoretic approach for choosing a detector tuning under stealthy sensor data attacks
Bishop et al.On false-data attacks in robust multi-sensor-based estimation
Honarvar et al.A PCA-based algorithm for online false data injection and jamming attacks detection in cyber-physical systems
Navazani et al.Enhancing cyber attack detection in CPS using a semi-supervised approach to determine parameters for DBSCAN algorithm
Kawano et al.Revisit input observability: A new approach to attack detection and privacy preservation
Masoumi et al.SimSPRT-II: Monte Carlo simulation of sequential probability ratio test algorithms for optimal prognostic performance
Meng et al.Recursive filtering for complex networks against random deception attacks
Qu et al.K–L Divergence-Based Detection of Attacks on Remote Control: The Utilization of Local Information
Marelli et al.Statistical approach to detection of attacks for stochastic cyber-physical systems
Langeroudi et al.Integration of failure detector in bias filter for estimation of false data injection cyberattacks
He et al.Smart grid fault detection using locally optimum unknown or estimated direction hypothesis test

[8]ページ先頭

©2009-2025 Movatter.jp