2015 European Control Conference (ECC) 2015
DOI: 10.1109/ecc.2015.7331099
|View full text |Cite
|
Sign up to set email alerts
|

Finite energy and bounded actuator attacks on cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…If the actuator attack signal is constant, then there exists a finite-time T ′ such that . d f (t) = 0, t ≥ T ′ , and consequently, by (26), V(e(t),d f (t)) < 0, t ≥ T ′ , for ||e(t)|| 2 > 2||P|| 2 ||B 1 || 2 min (Q) || n−d+1 (t)|| 2 , t ≥ T ′ . Therefore, it follows from theorem 4.15 in the work of Haddad and Chellaboina 30 that the system given by (25) is input-to-state stable with respect to n − d + 1 (t).…”
Section: Adaptive Corrective Control Signalmentioning
confidence: 93%
See 4 more Smart Citations
“…If the actuator attack signal is constant, then there exists a finite-time T ′ such that . d f (t) = 0, t ≥ T ′ , and consequently, by (26), V(e(t),d f (t)) < 0, t ≥ T ′ , for ||e(t)|| 2 > 2||P|| 2 ||B 1 || 2 min (Q) || n−d+1 (t)|| 2 , t ≥ T ′ . Therefore, it follows from theorem 4.15 in the work of Haddad and Chellaboina 30 that the system given by (25) is input-to-state stable with respect to n − d + 1 (t).…”
Section: Adaptive Corrective Control Signalmentioning
confidence: 93%
“…4,11,17,18,22,26,27 Consequently, as shown in Figure 1, it is assumed that the control inputũ(t) is compromised so that Here, a false data injection actuator attack is considered, where an attacker modifies the data sent from the controller to the actuators.…”
Section: Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations