A survey on security of cyber-physical systems under network attacks

被引:0
|
作者
Ye, Dan [1 ,2 ]
Jin, Kai-Jing [1 ]
Zhang, Tian-Yu [1 ]
机构
[1] College of Information Science and Engineering, Northeastern University, Shenyang,110819, China
[2] State Key Laboratory of Synthetical Automation of Process Industries, Northeastern University, Shenyang,110819, China
来源
Kongzhi yu Juece/Control and Decision | 2023年 / 38卷 / 08期
关键词
Compilation and indexing terms; Copyright 2025 Elsevier Inc;
D O I
10.13195/j.kzyjc.2023.0386
中图分类号
学科分类号
摘要
Computer crime - Cyber attacks - Embedded systems - Network security - State estimation
引用
收藏
页码:2243 / 2252
相关论文
共 50 条
  • [21] Security in Cyber-Physical Systems
    Dsouza, Joanita
    Elezabeth, Laura
    Mishra, Ved Prakash
    Jain, Rachna
    [J]. PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 840 - 844
  • [22] Cyber-Physical Systems – Security
    Tanja Zseby
    [J]. e & i Elektrotechnik und Informationstechnik, 2018, 135 (3) : 249 - 249
  • [23] Co-simulation for Cyber-Physical Distribution Network Under Cyber Attacks
    Zhang, W. H.
    Qian, T.
    Lin, X.
    Tang, W. H.
    Wu, Q. H.
    [J]. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 2996 - 3002
  • [24] Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
    Baniamerian, Amir
    Khorasani, Khashayar
    Meskin, Nader
    [J]. 2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 4507 - 4513
  • [25] Security of unmanned aerial vehicle systems against cyber-physical attacks
    Rani, Chaitanya
    Modares, Hamidreza
    Sriram, Raghavendra
    Mikulski, Dariusz
    Lewis, Frank L.
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2016, 13 (03): : 331 - 342
  • [26] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    [J]. 2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [27] A method for evaluating the consequence propagation of security attacks in cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 67 : 57 - 71
  • [28] Observer-based security control for distributed cyber-physical systems under replay attacks
    Li, Xiao-Meng
    Xiao, Wenbin
    Lin, Guohuai
    Li, Hongyi
    Lu, Renquan
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (13) : 8015 - 8035
  • [29] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    [J]. HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [30] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    [J]. 2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10