2022
DOI: 10.1109/tcyb.2020.3025307
|View full text |Cite
|
Sign up to set email alerts
|

Reachability Analysis of Cyber-Physical Systems Under Stealthy Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…Remark Assumption 3 is common in the existing literature 16,20,23 . It implies that the attacker could carefully design the attacks such that they are stealthy for the considered CPS.…”
Section: System Description and Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…Remark Assumption 3 is common in the existing literature 16,20,23 . It implies that the attacker could carefully design the attacks such that they are stealthy for the considered CPS.…”
Section: System Description and Preliminariesmentioning
confidence: 99%
“…Assumption 3 is common in the existing literature. 16,20,23 It implies that the attacker could carefully design the attacks such that they are stealthy for the considered CPS. Such parameters can be obtained by system identification or directly obtained from internal staffs.…”
Section: Plant Model Under Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…In [50], the authors assumed that the system disturbance and measurement noise to be unknownbut-bounded and analyzed the reachability issue based on zonotopic set theory. Related works regarding reachability analysis can be found in [51]- [54].…”
Section: Analysis Of Cyber-attacksmentioning
confidence: 99%