Login / Signup
A Covert System Identification Attack on Constant Setpoint Control Systems.
Tyler Phillips
Hoda Mehrpouyan
John Gardner
Stephen Reese
Published in:
CANDAR Workshops (2019)
Keyphrases
</>
control system
input output
information flow
malicious attacks
attack detection
closed loop
recurrent neural networks
countermeasures
industrial automation
malicious users
neural network
control strategy
nonlinear dynamics
attack graph