Revealing stealthy attacks in control systems.
André TeixeiraIman ShamesHenrik SandbergKarl Henrik JohanssonPublished in: Allerton Conference (2012)
Keyphrases
- control system
- countermeasures
- traffic analysis
- malicious attacks
- watermarking scheme
- real time
- digital images
- fault detection and isolation
- security threats
- closed loop
- control strategy
- data corruption
- digital image watermarking
- malicious users
- computer security
- detect malicious
- terrorist attacks
- denial of service attacks
- control algorithm
- dynamic environments
- cooperative