A Novel Networked Control Scheme with Safety Guarantees for Detection and Mitigation of Cyber-Attacks.
Kian GheitasiMohsen GhaderiWalter LuciaPublished in: ECC (2019)
Keyphrases
- control scheme
- cyber attacks
- closed loop
- control system
- control strategy
- dynamic model
- attack detection
- control loop
- predictive control
- robot manipulators
- control law
- pid controller
- countermeasures
- cyber security
- risk management
- intrusion detection system
- security policies
- critical infrastructure
- intrusion detection
- anomaly detection
- low cost