Optimal DoS Attack Against LQR Control Channels

[1]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[2]  Wei Zhang,et al.  Stability of networked control systems , 2001 .

[3]  Alessandro Trifiletti,et al.  Leakage Power Analysis Attacks: A Novel Class of Attacks to Nanometer Cryptographic Circuits , 2010, IEEE Transactions on Circuits and Systems I: Regular Papers.

[4]  Jianbin Qiu,et al.  Fuzzy Adaptive Finite-Time Fault-Tolerant Control for Strict-Feedback Nonlinear Systems , 2020, IEEE Transactions on Fuzzy Systems.

[5]  Stéphane Lafortune,et al.  Detection and Mitigation of Classes of Attacks in Supervisory Control Systems , 2018, Autom..

[6]  Jian Sun,et al.  Optimal data integrity attack on actuators in Cyber-Physical Systems , 2016, 2016 American Control Conference (ACC).

[7]  Qie He,et al.  Optimal switching sequence for switched linear systems , 2018, SIAM J. Control. Optim..

[8]  Tongwen Chen,et al.  An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[9]  Yongxiang Xia,et al.  Vulnerability Assessment of Power Grids Against Link-Based Attacks , 2020, IEEE Transactions on Circuits and Systems II: Express Briefs.

[10]  Ling Shi,et al.  Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.

[11]  Li Yu,et al.  Packet-Based State Feedback Control Under DoS Attacks in Cyber-Physical Systems , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.

[12]  Tamer Basar,et al.  Optimal control of LTI systems over unreliable communication links , 2006, Autom..

[13]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[14]  Ruochi Zhang,et al.  Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.

[15]  Jian Sun,et al.  Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.

[16]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[17]  Luca Schenato,et al.  To Zero or to Hold Control Inputs With Lossy Links? , 2009, IEEE Transactions on Automatic Control.