Attack-Tolerant networked control system based on the deception for the cyber-attacks.
Amer Atta YaseenMireille BayartPublished in: WCICSS (2015)
Keyphrases
- cyber attacks
- networked control systems
- cyber security
- attack detection
- countermeasures
- communication networks
- control theory
- intrusion detection system
- dos attacks
- security policies
- critical infrastructure
- intrusion detection
- feedback control
- privacy issues
- computer systems
- pid controller
- cyber crime
- control method
- network security
- information security
- security mechanisms
- packet loss
- information systems
- control scheme
- computer networks
- distributed databases
- access control
- wireless sensor networks