Stealthy attacks and attack-resilient interval observers.
Kwassi H. DegueJerome Le NyDenis V. EfimovPublished in: Autom. (2022)
Keyphrases
- countermeasures
- attack detection
- malicious users
- malicious attacks
- differential power analysis
- denial of service attacks
- attack scenarios
- power analysis
- dos attacks
- fault injection
- denial of service
- cyber attacks
- ddos attacks
- injection attacks
- security risks
- data corruption
- block cipher
- normal traffic
- network attacks
- security measures
- digital watermark
- detecting malicious
- network intrusion
- network intrusions
- network anomaly detection
- information leakage
- network traffic
- attack graphs
- information security
- security vulnerabilities
- intrusion detection system
- malicious nodes
- insider attacks
- phishing attacks
- defense mechanisms
- network intrusion detection
- intrusion detection
- buffer overflow
- network security
- java card
- smart card
- attack graph
- distributed denial of service attacks
- malicious activities
- anomaly detection
- watermarking scheme
- security threats
- cyber security