Jamming Attacks Against Control Systems: A Survey.
Yanbo DongPeng ZhouPublished in: LSMS/ICSEE (2) (2017)
Keyphrases
- control system
- countermeasures
- malicious attacks
- closed loop
- watermarking scheme
- terrorist attacks
- control law
- attack detection
- traffic analysis
- data sets
- malicious users
- control strategy
- denial of service attacks
- fault detection and isolation
- database
- industrial automation
- data publishing
- cryptographic protocols
- ddos attacks
- security mechanisms
- smart card
- augmented reality