ATTACKS

作品数:470被引量:519H指数:9
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:张颖李彦辉王新生更多>>
相关机构:华南理工大学湖南大学中南大学重庆大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划中国博士后科学基金北京市自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=IEEE/CAA Journal of Automatica Sinicax
条 记 录,以下是1-10
视图:
排序:
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
《IEEE/CAA Journal of Automatica Sinica》2024年第11期2191-2203,共13页Mahdi Taheri Khashayar Khorasani Nader Meskin 
the financial support received from NATO under the Emerging Security Challenges Division program;the support received from NPRP (10-0105-17017) from the Qatar National Research Fund (a member of Qatar Foundation);the support received from the Natural Sciences and Engineering Research Council of Canada (NSERC) and the Department of National Defence (DND) under the Discovery Grant and DND Supplemental Programs;supported in part by funding from the Innovation for Defence Excellence and Security (IDEaS) program from the Department of National Defence (DND)。
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...
关键词:Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks 
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
《IEEE/CAA Journal of Automatica Sinica》2024年第8期1865-1876,共12页Weiwei Sun Xinci Gao Lusong Ding Xiangyu Chen 
supported in part by the National Natural Science Foundation of China(62073189,62173207);the Taishan Scholar Project of Shandong Province(tsqn202211129)。
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati...
关键词:Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP). 
Cybersecurity Landscape on Remote State Estimation:A Comprehensive Review
《IEEE/CAA Journal of Automatica Sinica》2024年第4期851-865,共15页Jing Zhou Jun Shang Tongwen Chen 
the Natural Sciences and Engineering Research Council(NSERC)of Canada。
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state esti...
关键词:Cyber-attacks Kalman filtering remote state estimation unreliable transmission channels 
Resilient Event-Triggered Control of Connected Automated Vehicles Under Cyber Attacks被引量:2
《IEEE/CAA Journal of Automatica Sinica》2023年第12期2300-2302,共3页Ning Zhao Xudong Zhao Ning Xu Liang Zhang 
supported in part by the National Natural Science Foundation of China(62203064,62203065,62303069);the Open Fund of Institute of Ocean Research of Bohai University(BDHYYJY2023017)。
Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the ef...
关键词:DOS service AUTOMATED 
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey被引量:5
《IEEE/CAA Journal of Automatica Sinica》2023年第8期1647-1667,共21页Li Duan Yangyang Sun Wei Ni Weiping Ding Jiqiang Liu Wei Wang 
supported by the Beijing Natural Science Foundation(4212008);the National Natural Science Foundation of China(62272031);the Open Foundation of Information Security Evaluation Center of Civil Aviation,Civil Aviation University of China(ISECCA-202101);Guangxi Key Laboratory of Cryptography and Information Security(GCIS201915);supported in part by the National Natural Science Foundation of China(U21A20463,U22B2027)。
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc...
关键词:Blockchain cross-chain DEFENSE distributed private key control hash-locking NOTARY security threats sidechain/relay 
A Novel Memory-Based Scheduling Protocol for Networked Control Systems Under Stochastic Attacks and Bandwidth Constraint
《IEEE/CAA Journal of Automatica Sinica》2023年第5期1336-1339,共4页Hongchenyu Yang Chen Peng Zhiru Cao 
supported in part by National Natural Science Foundation of China(62173218,61833011);the International Corporation Project of Shanghai Science and Technology Commission(21190780300)。
Dear Editor,In this letter,a novel memory-based scheduling protocol(MBSP)is investigated for networked control systems(NCSs)under bandwidth constraint and stochastic denial-of-service(DoS)attacks.First,considering the...
关键词:service CONSTRAINT DOS 
Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems被引量:4
《IEEE/CAA Journal of Automatica Sinica》2023年第5期1181-1191,共11页Haibin Guo Jian Sun Zhong-Hua Pang 
supported by the National Natural Science Foundation of China(61925303,62173034,62088101,U20B2073,62173002);the National Key Research and Development Program of China(2021YFB1714800);Beijing Natural Science Foundation(4222045)。
This paper investigates the security issue of multisensor remote estimation systems.An optimal stealthy false data injection(FDI)attack scheme based on historical and current residuals,which only tampers with the meas...
关键词:Cyber-physical systems(CPSs) false data injection(FDI)attacks remote state estimation stealthy attacks 
Resilient and Safe Platooning Control of Connected Automated Vehicles Against Intermittent Denial-of-Service Attacks被引量:18
《IEEE/CAA Journal of Automatica Sinica》2023年第5期1234-1251,共18页Xiaohua Ge Qing-Long Han Qing Wu Xian-Ming Zhang 
supported in part by Australian Research Council Discovery Early Career Researcher Award(DE210100273)。
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumpti...
关键词:Connected automated vehicles(CAVs) cooperative adaptive cruise control denial-of-service(DoS)attacks resilient control vehicle platooning vehicle-to-vehicle communication 
Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks被引量:2
《IEEE/CAA Journal of Automatica Sinica》2023年第4期898-915,共18页Kangkang Zhang Christodoulos Keliris Thomas Parisini Bin Jiang Marios M.Polycarpou 
This work was supported by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skodowska-Curie(101027980(CSPCPS-A-ICA),739551(KIOS CoE-TEAMING));the Italian Ministry for Research in the Framework of the 2017 Program for Research Projects of National Interest(PRIN)(2017YKXYXJ);the National Natural Science Foundation of China(61903188,62073165,62020106003);the Natural Science Foundation of Jiangsu Province(BK20190403);the 111 Project(B20007);the Priority Academic Program Development of Jiangsu Higher Education Institutions.
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integri...
关键词:Backward-in-time equivalent quantity fixed-point smoother intermittent integrity attacks 
Resilient Time-Varying Formation-Tracking of Multi-UAV Systems Against Composite Attacks: A Two-Layered Framework被引量:3
《IEEE/CAA Journal of Automatica Sinica》2023年第4期969-984,共16页Xin Gong Michael V.Basin Zhiguang Feng Tingwen Huang Yukang Cui 
This work was supported in part by the National Natural Science Foundation of China(61903258);Guangdong Basic and Applied Basic Research Foundation(2022A1515010234);the Project of Department of Education of Guangdong Province(2022KTSCX105);Qatar National Research Fund(NPRP12C-0814-190012).
This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of...
关键词:Composite attacks multi-UAV systems resilient control time-varying formation-tracking 
检索报告 对象比较 聚类工具 使用帮助 返回顶部