Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification.
Zhihao DaiLigang HeShuang-Hua YangMatthew LeekePublished in: DASC/PiCom/CBDCom/CyberSciTech (2023)
Keyphrases
- control system
- real time
- sensor networks
- control loop
- sensor data
- intrusion detection and prevention
- closed loop
- industrial applications
- fuzzy logic
- critical infrastructure
- countermeasures
- control strategy
- technology transfer
- control method
- control algorithm
- control scheme
- multi sensor
- fuzzy control
- malicious attacks
- neural network
- control law
- real environment
- industrial processes
- watermarking scheme
- fuzzy controller
- terrorist attacks
- attack detection
- remote monitoring
- data acquisition