Identification of system vulnerability under a smart sensor attack via attack model reduction
In this letter, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks. Here, the system vulnerability refers to the existence of key observation sequences that could be exp...
Saved in:
Main Authors: | Tai, Ruochen, Lin, Liyong, Su, Rong |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Article |
Language: | English |
Published: |
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/164232 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
On decidability of existence of nonblocking supervisors resilient to smart sensor attacks
by: Su, Rong
Published: (2023) -
Information theoretical analysis of unfair rating attacks under subjectivity
by: Wang, Dongxia, et al.
Published: (2021) -
Interdependency and vulnerability of multipartite networks under target node attacks
by: Cai, Qing, et al.
Published: (2020) -
Laser Profiling for the Back-Side Fault Attacks: With a Practical Laser Skip Instruction Attack on AES
by: Breier, Jakub, et al.
Published: (2017) -
Removal attack: a research on vulnerability of box-free watermarking
by: An, Haonan
Published: (2024)