Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
linear time-invariant system
biblio
An SMT-Based Approach to Secure State Estimation under Sensor and Actuator Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:48pm
Metrics
state estimation
sparse strong observability
SMT-based approach
sensors
sensor attacks
security
secure state estimator
satisfiability modulo theory
Resiliency
resilience
pubcrawl
Observability
actuator attacks
Mathematical model
linear time-invariant system
Linear systems
Human behavior
fault tolerance
computability
composability
adversarial attack
adversarial agent
actuators
actuator security
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Tue, 05/05/2015 - 12:37pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models
biblio
Modeling impact of attacks, recovery, and attackability conditions for situational awareness
Submitted by BrandonB on Thu, 04/30/2015 - 12:05pm
Intrusion Detection
topological attackability condition
timing relationships
time Petri nets
situational awareness
sensors
security of data
scanners
Petri nets
numerical evaluation
modeling impact
linear time-invariant system
Linear systems
actuators
Fires
dynamic analysis
distributed processing
distributed cyber control system
distributed control system
Decentralized Control
controllers
Control Theory
assets influence
anomaly-based intrusion detection system
Analytical models