2017
DOI: 10.1088/1742-6596/783/1/012022
|View full text |Cite
|
Sign up to set email alerts
|

Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In addition, there are several graph‐based techniques for identifying inherent network vulnerabilities that could be exploited by a malicious insider [22]. A technique based on the dependency graph is used to analyse dependencies among the identified vulnerabilities associated with insider attacks [23]. A tuple has been used to capture various variables based on an organisation structure [24] and to trace a sequence of attacks leading up to a safety violation.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, there are several graph‐based techniques for identifying inherent network vulnerabilities that could be exploited by a malicious insider [22]. A technique based on the dependency graph is used to analyse dependencies among the identified vulnerabilities associated with insider attacks [23]. A tuple has been used to capture various variables based on an organisation structure [24] and to trace a sequence of attacks leading up to a safety violation.…”
Section: Introductionmentioning
confidence: 99%
“…This new viewpoint in control engineering has been successfully illustrated in many concrete casestudies (see, e.g., the references in[34], and[1,2,3,4,17,21,43,47,49,50,52,53,54,57,55,66,72,81,82,87,88,89,90,91,94,95]). Some of the methods have been patented and some have been applied to life sciences[35,43,47,57,81].…”
mentioning
confidence: 96%