Login / Signup

Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems.

Hauke HesedingMoritz DieingAnkush MeshramMartina Zitterbart
Published in: INDIN (2023)
Keyphrases
  • networked control systems
  • security protocols
  • cryptographic protocols
  • feedback control
  • anomaly detection
  • control law
  • guaranteed cost
  • long time delay