Login / Signup
A formal verification approach to revealing stealth attacks on networked control systems.
Nikola Trcka
Mark Moulin
Shaunak D. Bopardikar
Alberto Speranzon
Published in:
HiCoNS (2014)
Keyphrases
</>
formal verification
networked control systems
model checking
feedback control
long time delay
control theory
automated verification
communication networks
guaranteed cost
packet loss
model checker
bounded model checking
control method
closed loop
pid controller
control law