Deception-Resistant Stochastic Manufacturing for Automated Production Lines
Abstract
References
Index Terms
- Deception-Resistant Stochastic Manufacturing for Automated Production Lines
Recommendations
Stochastic detection against deception attacks in CPS: Performance evaluation and game-theoretic analysis
AbstractIn this paper, we consider a security problem of remote state estimation in cyber–physical systems (CPS). The state measurements of a dynamic process, obtained by wireless sensors, may be modified deceptively by a malicious attacker, ...
A moving target defence approach for detecting deception attacks on cyber-physical systems
AbstractCyber-physical systems have posed new challenges, affecting their users. The information security of these systems against cyber-attacks is considered one of the most complex issues in a wide range of defences. The present study ...
Optimal deception attacks on remote state estimators equipped with interval anomaly detectors
AbstractThis paper studies the problem of optimal deception attacks on remote state estimation, where an interval χ 2 detector is deployed to reveal anomalies. The information-based attack policy that can bypass the anomaly detector and cause ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/1b2a05d2-5025-4c08-8b08-a923dc59232f/3678890.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 241Total Downloads
- Downloads (Last 12 months)241
- Downloads (Last 6 weeks)173
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in