Mostrar el registro sencillo del ítem

dc.contributor.author
Sui, Tianju  
dc.contributor.author
Mo, Yilin  
dc.contributor.author
Marelli, Damian Edgardo  
dc.contributor.author
Sun, Ximing  
dc.date.available
2022-05-02T18:01:17Z  
dc.date.issued
2020-04  
dc.identifier.citation
Sui, Tianju; Mo, Yilin; Marelli, Damian Edgardo; Sun, Ximing; The Vulnerability of Cyber-Physical System Under Stealthy Attacks; Institute of Electrical and Electronics Engineers; IEEE Transactions on Automatic Control; 66; 2; 4-2020; 637-650  
dc.identifier.issn
0018-9286  
dc.identifier.uri
http://hdl.handle.net/11336/156245  
dc.description.abstract
In this article, we study the impact of stealthy attacks on the cyber-physical system (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, output or both, and it is called stealthy (resp. strictly stealthy) if it produces bounded changes (resp. no changes) in the detection residue. Correspondingly, a CPS is called vulnerable (resp. strictly vulnerable) if it can be destabilized by a stealthy attack (resp. strictly stealthy attack). We provide necessary and sufficient conditions for the vulnerability and strictly vulnerability. For the invulnerable case, we also provide a performance bound for the difference between healthy and attacked system. Numerical examples are provided to illustrate the theoretical results.  
dc.format
application/pdf  
dc.language.iso
eng  
dc.publisher
Institute of Electrical and Electronics Engineers  
dc.rights
info:eu-repo/semantics/restrictedAccess  
dc.rights.uri
https://creativecommons.org/licenses/by-nc-sa/2.5/ar/  
dc.subject
Cyber-Physical System  
dc.subject
Stochastic linear system  
dc.subject
Denial-of-Service  
dc.subject.classification
Control Automático y Robótica  
dc.subject.classification
Ingeniería Eléctrica, Ingeniería Electrónica e Ingeniería de la Información  
dc.subject.classification
INGENIERÍAS Y TECNOLOGÍAS  
dc.title
The Vulnerability of Cyber-Physical System Under Stealthy Attacks  
dc.type
info:eu-repo/semantics/article  
dc.type
info:ar-repo/semantics/artículo  
dc.type
info:eu-repo/semantics/publishedVersion  
dc.date.updated
2021-08-19T19:53:50Z  
dc.journal.volume
66  
dc.journal.number
2  
dc.journal.pagination
637-650  
dc.journal.pais
Estados Unidos  
dc.description.fil
Fil: Sui, Tianju. Dalian University of Technology; China  
dc.description.fil
Fil: Mo, Yilin. Tsinghua University; China  
dc.description.fil
Fil: Marelli, Damian Edgardo. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Rosario. Centro Internacional Franco Argentino de Ciencias de la Información y de Sistemas. Universidad Nacional de Rosario. Centro Internacional Franco Argentino de Ciencias de la Información y de Sistemas; Argentina  
dc.description.fil
Fil: Sun, Ximing. Dalian University of Technology; China  
dc.journal.title
IEEE Transactions on Automatic Control  
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/doi/http://dx.doi.org/10.1109/TAC.2020.2987307  
dc.relation.alternativeid
info:eu-repo/semantics/altIdentifier/url/https://ieeexplore.ieee.org/document/9069226