基本信息来源于合作网站,原文需代理用户跳转至来源网站获取       
摘要:
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
推荐文章
Zinc isotope fractionation under vaporization processes and in aqueous solutions
Evaporation process
Zinc isotope
Kinetic isotope fractionation
Equilibrium fractionation
Zinc species in solution
Identification of bacterial fossils in marine source rocks in South China
South China
Excellent marine source rocks
Bacterial fossil
Sedimentary environment
内容分析
关键词云
关键词热度
相关文献总数  
(/次)
(/年)
文献信息
篇名 System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:the optimality of attack strategy
来源期刊 控制理论与技术(英文版) 学科
关键词
年,卷(期) 2022,(1) 所属期刊栏目 RESEARCH ARTICLES
研究方向 页码范围 127-138
页数 12页 分类号
字数 语种 英文
DOI
五维指标
传播情况
(/次)
(/年)
引文网络
引文网络
二级参考文献  (0)
共引文献  (0)
参考文献  (0)
节点文献
引证文献  (0)
同被引文献  (0)
二级引证文献  (0)
2022(0)
  • 参考文献(0)
  • 二级参考文献(0)
  • 引证文献(0)
  • 二级引证文献(0)
引文网络交叉学科
相关学者/机构
期刊影响力
控制理论与技术(英文版)
季刊
2095-6983
44-1706/TP
16开
广州市五山华南理工大学内
2003
eng
出版文献量(篇)
1113
总下载数(次)
0
总被引数(次)
4188
论文1v1指导