Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks

In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents t...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of automation and computing Vol. 15; no. 3; pp. 345 - 354
Main Authors Rhouma, Taouba, Chabir, Karim, Abdelkrim, Mohamed Naceur
Format Journal Article
LanguageEnglish
Published Beijing Institute of Automation, Chinese Academy of Sciences 01.06.2018
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1476-8186
2153-182X
1751-8520
2153-1838
DOI10.1007/s11633-017-1059-x

Cover

Loading…
Abstract In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents the ability of systems or network architectures to continue providing their intended behavior during attack and recovery. When a cyber attack on the control signal of a networked control system is computed to remain undetectable from passive model-based fault detection and isolation schemes, we show that the consequence of a zero dynamic attack on the state variable of the plant is undetectable during attack but it becomes apparent after the end of the attack. A resilient linear quadratic Gaussian controller, having the ability to quickly recover the nominal behavior of the closed-loop system after the attack end, is designed by updating online the Kalman filter from information given by an active version of the generalized likelihood ratio detector.
AbstractList In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data injection attacks that are designed so that they cannot be detected based on control input and measurement data. Cyber resilience represents the ability of systems or network architectures to continue providing their intended behavior during attack and recovery. When a cyber attack on the control signal of a networked control system is computed to remain undetectable from passive model-based fault detection and isolation schemes, we show that the consequence of a zero dynamic attack on the state variable of the plant is undetectable during attack but it becomes apparent after the end of the attack. A resilient linear quadratic Gaussian controller, having the ability to quickly recover the nominal behavior of the closed-loop system after the attack end, is designed by updating online the Kalman filter from information given by an active version of the generalized likelihood ratio detector.
Author Rhouma, Taouba
Abdelkrim, Mohamed Naceur
Chabir, Karim
Author_xml – sequence: 1
  givenname: Taouba
  orcidid: 0000-0002-3763-212X
  surname: Rhouma
  fullname: Rhouma, Taouba
  email: taouba.rhouma@gmail.com
  organization: Modeling, Analysis and Control of Systems (MACS) Laboratory, National Engineering School of Gabes (ENIG), University of Gabes
– sequence: 2
  givenname: Karim
  orcidid: 0000-0002-2377-7205
  surname: Chabir
  fullname: Chabir, Karim
  organization: Modeling, Analysis and Control of Systems (MACS) Laboratory, National Engineering School of Gabes (ENIG), University of Gabes
– sequence: 3
  givenname: Mohamed Naceur
  surname: Abdelkrim
  fullname: Abdelkrim, Mohamed Naceur
  organization: Modeling, Analysis and Control of Systems (MACS) Laboratory, National Engineering School of Gabes (ENIG), University of Gabes
BookMark eNp9kF1LwzAUhoNMcE5_gHcFr-Ny2jRpL0fxC4Zf0-uQpol265qZZLj-ezsqCoJencPhfc4573uMRq1tNUJnQC6AED71ACxJMAGOgaQ53h2gMfAUcJbGZNT3lDOcQcaO0LH3S0IYj3M6Ro9P2tdNrdsQFbYNzjaRsS660-HDupWuvqeLzge99tFiWy61ClGwUdGV2k0f3jpfK9lEsxCkWvkTdGhk4_XpV52gl6vL5-IGz--vb4vZHKsEWMDUKJnThJm8TCBVVJUVr7JM0zhWGeGSaGW4URwI15CDAUkZqUotaZbkJmfJBJ0PezfOvm-1D2Jpt67tT4o4741mlADpVXxQKWe9d9oIVQcZ6r0rWTcCiNjnJ4b8RJ-f2Ocndj0Jv8iNq9fSdf8y8cD4Xtu-avfz09_QJ559ha8
CitedBy_id crossref_primary_10_1016_j_jfranklin_2022_02_009
crossref_primary_10_1016_j_neucom_2019_01_099
crossref_primary_10_1080_00207721_2020_1772402
crossref_primary_10_1155_2022_6732343
crossref_primary_10_1007_s12555_018_0470_6
crossref_primary_10_1049_cmu2_12557
crossref_primary_10_1016_j_amc_2021_126593
crossref_primary_10_1080_23335777_2019_1631889
crossref_primary_10_1109_TFUZZ_2020_2983904
crossref_primary_10_1007_s11768_023_00141_2
crossref_primary_10_1007_s42835_022_01338_2
Cites_doi 10.1016/j.arcontrol.2008.03.008
10.1145/2185505.2185515
10.1109/TAC.1976.1101146
10.3182/20140824-6-ZA-1003.02184
10.1080/00207721.2014.906683
10.1016/0005-1098(90)90018-D
10.1007/978-1-4615-5149-2
10.1109/JPROC.2006.887291
10.1007/978-3-642-00602-9_3
10.1007/s11633-015-0897-7
10.1109/JPROC.2006.887288
10.1145/1653662.1653666
ContentType Journal Article
Copyright Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017
Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017.
Copyright_xml – notice: Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017
– notice: Institute of Automation, Chinese Academy of Sciences and Springer-Verlag GmbH Germany, part of Springer Nature 2017.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOI 10.1007/s11633-017-1059-x
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection (ProQuest)
ProQuest One
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Advanced Technologies & Aerospace Collection
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1751-8520
2153-1838
EndPage 354
ExternalDocumentID 10_1007_s11633_017_1059_x
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.86
.VR
06D
0R~
0VY
1N0
29~
2B.
2C0
2J2
2KG
2KM
2LR
2VQ
2~H
30V
4.4
408
40D
40E
5VR
5VS
6NX
8TC
8UJ
92H
92I
92R
93N
95-
95.
95~
96X
AAAVM
AABHQ
AAHNG
AAIAL
AAJKR
AANZL
AARHV
AARTL
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTMW
ABWNU
ABXPI
ACBXY
ACGFS
ACHXU
ACKNC
ACMLO
ACOKC
ACOMO
ACSNA
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEOHA
AEPYU
AETLH
AEVLU
AEXYK
AFGCZ
AFLOW
AFQWF
AFUIB
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGQMX
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMYQR
AOCGG
ARMRJ
AXYYD
B-.
BA0
BDATZ
BGNMA
CAG
CCEZO
CHBEP
COF
CS3
CSCUP
CUBFJ
CW9
DNIVK
EBS
EIOEI
EJD
ESBYG
FA0
FERAY
FFXSO
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
H13
HF~
HG6
HLICF
HMJXF
HRMNR
HZ~
IHE
IJ-
IXD
I~X
I~Z
J-C
JBSCW
KOV
M4Y
MA-
NQJWS
NU0
O9-
O9J
P9O
PF0
QOS
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCL
SDH
SEG
SHX
SISQX
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TCJ
TSG
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
YLTOR
Z7R
Z7X
Z83
Z88
ZMTXR
~A9
AAYXX
ACSTC
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
ID FETCH-LOGICAL-c316t-4fca9436f9b315c4cbd7d88e422c807a0ecf7fc7107e191f1a460dbea4839f963
IEDL.DBID U2A
ISSN 1476-8186
2153-182X
IngestDate Fri Jul 25 23:29:49 EDT 2025
Tue Jul 01 01:06:03 EDT 2025
Thu Apr 24 23:11:56 EDT 2025
Fri Feb 21 02:35:02 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords anomaly detector
cyber physical attacks
Kalman filtering
Networked control systems (NCSs)
resilient control
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-4fca9436f9b315c4cbd7d88e422c807a0ecf7fc7107e191f1a460dbea4839f963
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3763-212X
0000-0002-2377-7205
PQID 2918684010
PQPubID 6623301
PageCount 10
ParticipantIDs proquest_journals_2918684010
crossref_citationtrail_10_1007_s11633_017_1059_x
crossref_primary_10_1007_s11633_017_1059_x
springer_journals_10_1007_s11633_017_1059_x
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20180600
2018-6-00
20180601
PublicationDateYYYYMMDD 2018-06-01
PublicationDate_xml – month: 6
  year: 2018
  text: 20180600
PublicationDecade 2010
PublicationPlace Beijing
PublicationPlace_xml – name: Beijing
PublicationTitle International journal of automation and computing
PublicationTitleAbbrev Int. J. Autom. Comput
PublicationYear 2018
Publisher Institute of Automation, Chinese Academy of Sciences
Springer Nature B.V
Publisher_xml – name: Institute of Automation, Chinese Academy of Sciences
– name: Springer Nature B.V
References Amin, Cárdenas, Sastry (CR7) 2009
Zhu (CR28) 2011
Mo, Sinopoli (CR11) 2009
De Persis, Tesi (CR27) 2014; 47
Chen, Kar, Moura (CR6) 2015
Teixeira, Shames, Sandberg, Johansson (CR20) 2012
Pasqualetti, Dórfler, Bullo (CR10) 2012
Willsky, Jones (CR24) 1976; 21
Stouffer, Falco, Scarfone (CR3) 2007
Keller, Chabir, Sauter (CR22) 2016; 47
Antsaklis, Baillieul (CR1) 2007; 95
Keller, Sauter (CR21) 2013
Frank (CR15) 1990; 26
Brunner, Hofinger, Krauss, Roblee, Schoo, Todt (CR19) 2010
Pasqualetti (CR14) 2012
Hespanha, Naghshtabrizi, Xu (CR2) 2007; 95
Chabir, Sauter, Al-Salami, Aubrun (CR18) 2012
Zhang, Jiang (CR25) 2008; 32
Teixeira, Sandberg, Johansson (CR9) 2010
Chen, Patton (CR16) 1999
Yuan, Zhu, Sun, Wang, Ba¸sar (CR26) 2013
Teixeira, Pérez, Sandberg, Johansson (CR5) 2012
Smith (CR12) 2011
Ding (CR17) 2008
Do, Fillatre, Nikiforov (CR23) 2014
Tian, Gao, Gong, Shi (CR4) 2015; 12
Liu, Ning, Reiter (CR8) 2009
Cardenas, Amin, Sastry (CR13) 2008
P. M. Frank (1059_CR15) 1990; 26
A. Teixeira (1059_CR9) 2010
J. Y. Keller (1059_CR21) 2013
M. Brunner (1059_CR19) 2010
V. L. Do (1059_CR23) 2014
Y. Chen (1059_CR6) 2015
P. Antsaklis (1059_CR1) 2007; 95
X. Zhu (1059_CR28) 2011
Y. L. Mo (1059_CR11) 2009
Y. Liu (1059_CR8) 2009
F. Pasqualetti (1059_CR14) 2012
K. Chabir (1059_CR18) 2012
Y. M. Zhang (1059_CR25) 2008; 32
Y. Yuan (1059_CR26) 2013
A. A. Cardenas (1059_CR13) 2008
J. P. Hespanha (1059_CR2) 2007; 95
R. S. Smith (1059_CR12) 2011
K. Stouffer (1059_CR3) 2007
S. X. Ding (1059_CR17) 2008
J. Y. Keller (1059_CR22) 2016; 47
A. Teixeira (1059_CR5) 2012
Z. D. Tian (1059_CR4) 2015; 12
S. Amin (1059_CR7) 2009
F. Pasqualetti (1059_CR10) 2012
J. Chen (1059_CR16) 1999
A. Willsky (1059_CR24) 1976; 21
A. Teixeira (1059_CR20) 2012
C. Persis De (1059_CR27) 2014; 47
References_xml – volume: 32
  start-page: 229
  issue: 2
  year: 2008
  end-page: 252
  ident: CR25
  article-title: Bibliographical review on reconfigurable fault-tolerant control systems
  publication-title: Annual Reviews in Control
  doi: 10.1016/j.arcontrol.2008.03.008
– start-page: 462
  year: 2013
  end-page: 467
  ident: CR21
  article-title: Monitoring of stealthy attack in networked control systems
  publication-title: Proceedings of Conference on Control and Fault-Tolerant Systems
– start-page: 90
  year: 2011
  end-page: 95
  ident: CR12
  article-title: A decoupled feedback structure for covertly appropriating networked control systems
  publication-title: Proceedings of the 18th IFAC World Congress
– start-page: 55
  year: 2012
  end-page: 64
  ident: CR5
  article-title: Attack models and scenarios for networked control systems
  publication-title: Proceedings of the 1st International Conference on High Confidence Networked Systems
  doi: 10.1145/2185505.2185515
– year: 2008
  ident: CR17
  publication-title: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools
– year: 2015
  ident: CR6
  publication-title: Dynamic Attack Detection in Cyber-Physical Systems with Side Initial State Information
– start-page: 1107
  year: 2012
  end-page: 1112
  ident: CR18
  article-title: On fault detection and isolation (FDI) design for networked control systems with bounded delay constraints
  publication-title: Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes
– year: 2012
  ident: CR14
  publication-title: Secure Control Systems: A Control- Theoretic Approach to Cyber-Physical Security
– start-page: 1806
  year: 2012
  end-page: 1813
  ident: CR20
  article-title: Revealing stealthy attacks in control systems
  publication-title: Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing
– start-page: 3690
  year: 2010
  end-page: 3696
  ident: CR9
  article-title: Networked control systems under cyber attacks with applications to power networks
  publication-title: Proceedings of American Control Conference
– volume: 21
  start-page: 108
  issue: 1
  year: 1976
  end-page: 112
  ident: CR24
  article-title: A generalized likelihood ratio approach to the detection and estimation of jumps in linear systems
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.1976.1101146
– volume: 47
  start-page: 134
  issue: 3
  year: 2014
  end-page: 139
  ident: CR27
  article-title: Resilient control under denial-ofservice
  publication-title: IFAC Proceedings Volumes
  doi: 10.3182/20140824-6-ZA-1003.02184
– start-page: 3418
  year: 2012
  end-page: 3425
  ident: CR10
  article-title: Cyber-physical security via geometric control: Distributed monitoring and malicious attacks
  publication-title: Proceedings of the 51th Annual Conference on Decision and Control
– volume: 47
  start-page: 814
  issue: 4
  year: 2016
  end-page: 820
  ident: CR22
  article-title: Input reconstruction for networked control systems subject to deception attacks and data losses on control signals
  publication-title: International Journal of Systems Science
  doi: 10.1080/00207721.2014.906683
– year: 2010
  ident: CR19
  article-title: Infiltrating critical infrastructures with next-generation attacks
  publication-title: Fraunhofer Institute for Secure Information Technology
– year: 2011
  ident: CR28
  publication-title: Resilient Control and Intrusion Detection for SCADA^Systems
– volume: 26
  start-page: 459
  issue: 3
  year: 1990
  end-page: 474
  ident: CR15
  article-title: Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results
  publication-title: Automatica
  doi: 10.1016/0005-1098(90)90018-D
– year: 1999
  ident: CR16
  publication-title: Robust Model-Based Fault Diagnosis for Dynamic Systems
  doi: 10.1007/978-1-4615-5149-2
– volume: 95
  start-page: 5
  issue: 1
  year: 2007
  end-page: 8
  ident: CR1
  article-title: Special issue on technology of networked control systems
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2006.887291
– year: 2007
  ident: CR3
  article-title: Guide to industrial control systems (ICS) security
  publication-title: NIST^Special Publication
– start-page: 31
  year: 2009
  end-page: 45
  ident: CR7
  article-title: Safe and secure networked control systems under denial-of-service attacks
  publication-title: Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control
  doi: 10.1007/978-3-642-00602-9_3
– start-page: 911
  year: 2009
  end-page: 918
  ident: CR11
  article-title: Secure control against replay attacks
  publication-title: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing
– start-page: 495
  year: 2008
  end-page: 500
  ident: CR13
  article-title: Secure control: Towards survivable cyber-physical systems
  publication-title: Proceedings of the 28th International Conference on Distributed Computing SystemsWorkshops
– volume: 12
  start-page: 648
  issue: 6
  year: 2015
  end-page: 656
  ident: CR4
  article-title: Time-delay compensation method for networked control system based on time-delay prediction and implicit PIGPC
  publication-title: International Journal of Automation and Computing
  doi: 10.1007/s11633-015-0897-7
– start-page: 21
  year: 2009
  end-page: 32
  ident: CR8
  article-title: False data injection attacks against state estimation in electric power grids.
  publication-title: Proceedings of the 16th ACM^Conference on Computer and Communications Security
– start-page: 364
  year: 2014
  end-page: 369
  ident: CR23
  article-title: A statistical method for detecting cyber/physical attacks on SCADA^systems
  publication-title: Proceedings of IEEE Conference on Control Applications
– start-page: 54
  year: 2013
  end-page: 59
  ident: CR26
  article-title: Resilient control of cyber-physical systems against denialof- service attacks
  publication-title: Proceedings of the 6th International Symposium on Resilient Control Systems
– volume: 95
  start-page: 138
  issue: 1
  year: 2007
  end-page: 162
  ident: CR2
  article-title: A survey of recent results in networked control systems
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2006.887288
– volume-title: Dynamic Attack Detection in Cyber-Physical Systems with Side Initial State Information
  year: 2015
  ident: 1059_CR6
– start-page: 462
  volume-title: Proceedings of Conference on Control and Fault-Tolerant Systems
  year: 2013
  ident: 1059_CR21
– start-page: 3418
  volume-title: Proceedings of the 51th Annual Conference on Decision and Control
  year: 2012
  ident: 1059_CR10
– start-page: 1806
  volume-title: Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing
  year: 2012
  ident: 1059_CR20
– start-page: 1107
  volume-title: Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes
  year: 2012
  ident: 1059_CR18
– start-page: 21
  volume-title: Proceedings of the 16th ACM^Conference on Computer and Communications Security
  year: 2009
  ident: 1059_CR8
  doi: 10.1145/1653662.1653666
– volume-title: Robust Model-Based Fault Diagnosis for Dynamic Systems
  year: 1999
  ident: 1059_CR16
  doi: 10.1007/978-1-4615-5149-2
– volume: 32
  start-page: 229
  issue: 2
  year: 2008
  ident: 1059_CR25
  publication-title: Annual Reviews in Control
  doi: 10.1016/j.arcontrol.2008.03.008
– volume: 95
  start-page: 5
  issue: 1
  year: 2007
  ident: 1059_CR1
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2006.887291
– start-page: 90
  volume-title: Proceedings of the 18th IFAC World Congress
  year: 2011
  ident: 1059_CR12
– start-page: 54
  volume-title: Proceedings of the 6th International Symposium on Resilient Control Systems
  year: 2013
  ident: 1059_CR26
– start-page: 31
  volume-title: Proceedings of the 12th International Conference on Hybrid Systems: Computation and Control
  year: 2009
  ident: 1059_CR7
  doi: 10.1007/978-3-642-00602-9_3
– volume: 95
  start-page: 138
  issue: 1
  year: 2007
  ident: 1059_CR2
  publication-title: Proceedings of the IEEE
  doi: 10.1109/JPROC.2006.887288
– start-page: 55
  volume-title: Proceedings of the 1st International Conference on High Confidence Networked Systems
  year: 2012
  ident: 1059_CR5
  doi: 10.1145/2185505.2185515
– volume-title: Secure Control Systems: A Control- Theoretic Approach to Cyber-Physical Security
  year: 2012
  ident: 1059_CR14
– volume: 12
  start-page: 648
  issue: 6
  year: 2015
  ident: 1059_CR4
  publication-title: International Journal of Automation and Computing
  doi: 10.1007/s11633-015-0897-7
– start-page: 495
  volume-title: Proceedings of the 28th International Conference on Distributed Computing SystemsWorkshops
  year: 2008
  ident: 1059_CR13
– volume-title: Fraunhofer Institute for Secure Information Technology
  year: 2010
  ident: 1059_CR19
– volume: 21
  start-page: 108
  issue: 1
  year: 1976
  ident: 1059_CR24
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.1976.1101146
– volume: 47
  start-page: 814
  issue: 4
  year: 2016
  ident: 1059_CR22
  publication-title: International Journal of Systems Science
  doi: 10.1080/00207721.2014.906683
– volume: 26
  start-page: 459
  issue: 3
  year: 1990
  ident: 1059_CR15
  publication-title: Automatica
  doi: 10.1016/0005-1098(90)90018-D
– volume-title: NIST^Special Publication
  year: 2007
  ident: 1059_CR3
– start-page: 3690
  volume-title: Proceedings of American Control Conference
  year: 2010
  ident: 1059_CR9
– start-page: 911
  volume-title: Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing
  year: 2009
  ident: 1059_CR11
– volume-title: Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools
  year: 2008
  ident: 1059_CR17
– start-page: 364
  volume-title: Proceedings of IEEE Conference on Control Applications
  year: 2014
  ident: 1059_CR23
– volume: 47
  start-page: 134
  issue: 3
  year: 2014
  ident: 1059_CR27
  publication-title: IFAC Proceedings Volumes
  doi: 10.3182/20140824-6-ZA-1003.02184
– volume-title: Resilient Control and Intrusion Detection for SCADA^Systems
  year: 2011
  ident: 1059_CR28
SSID ssj0067294
ssj0003320693
Score 2.1569107
Snippet In this paper, we investigate a resilient control strategy for networked control systems (NCSs) subject to zero dynamic attacks which are stealthy false-data...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 345
SubjectTerms Automation
CAE) and Design
Closed loops
Communication
Communications networks
Computer Applications
Computer-Aided Engineering (CAD
Control
Control systems
Controllers
Cybersecurity
Design
Engineering
Fault detection
Feedback control
Kalman filters
Likelihood ratio
Linear quadratic Gaussian control
Mechatronics
Network control
Nuclear power plants
Random variables
Research Article
Resilience
Robotics
Sensors
Systems stability
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEA7aXryIomK1Sg6elNDdJN3NnqSWliJYarHQ27J5gVBabVeo_97JbraLgr3uI4eZZOabycw3CN0xJYVOdEiEoV3ClTVEaBUSJTLH7iQDy1xz8ss4Gs3487w79wm3jS-rrGxiYaj1SrkceYcmjtgdooHg8eOTuKlR7nbVj9A4RE0wwQKCr-bTYDyZ7rIsjNEgKph3wbUxAmB6Xl1tFv1zgEZcOVFMHMwg29_OqUacfy5JC98zPEHHHjTiXqnlU3RglmfodWo27wvXzoj7Zb05BgCKx2Vdt9G7p56UHIONcEkXnK9w_1uadWfidYR7ee5a7c_RbDh464-IH5BAFAujnHCrsoSzyCaShV3FldSxFsJwSpUI4iwwysZWAYiIDcRlNsx4FGhpMg6wyMLRu0CN5WppLhGWhqnM6q62FCJmC0BM8iQTklINkCkSLRRUkkmVZw93QywWac177ISZgjBTJ8x020L3u18-SuqMfR-3K3Gn_hRt0lrnLfRQqaB-_e9iV_sXu0ZHAHtEWfDVRo18_WVuAFrk8tbvnx9phsuR
  priority: 102
  providerName: ProQuest
Title Resilient Control for Networked Control Systems Subject to Cyber/Physical Attacks
URI https://link.springer.com/article/10.1007/s11633-017-1059-x
https://www.proquest.com/docview/2918684010
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ1LS8NAEMcXbS96EJ9YrWUPnpTFZLNJNsdY2opiqcVCPYXsC4TSShtBv72zeTQqKngKJJs9zL5-k5n5B6FzTwquIuUSrqlPmDSacCVdInlq1Z2EYzxbnHw_DG4m7HbqT8s67lWV7V6FJPOdui52A3SwuT8hsUxAABybvnXdYRJPaFxtvwHQYh5KZmFArFxbFcr8qYuvh1FNmN-CovlZ099FOyUk4rgY1T20oef7aPuTdOABehjr1fPMFjPibpFtjgE_8bDI6tZqfbeUJMewQ9hPLjhb4O670MurUTlCOM4yW2h_iCb93mP3hpS_RyDSc4OMMCPTiHmBiYTn-pJJoULFuWaUSu6EqaOlCY0EhAg1eGXGTVngKKFTBlBkYOEdocZ8MdfHCAvtydQoXxkK_rIBDBMsSrmgVAEwBbyFnMpOiSy1w-0vLGZJrXpsTZuAaRNr2uSthS7Wr7wUwhl_NW5Xxk_KNbRKaGSl_MH_c1roshqQ-vGvnZ38q_Up2gIG4kX2Vxs1suWrPgPOyEQHbfL-oIOa8eDprgfX695wNO7ks-0D217PMQ
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LTxsxEB5RONALKgJEIBQf4AKy2LWdXe8BIZQ2JDwiQCDltqxfEhJKINmq8Kf6GxnvI1GR4JbrPnwYf_Z8Y898A7DHtZImMSGVlrWo0M5SaXRItcy8upMKHPfFyVf9qHsvzgetwQL8q2thfFplvScWG7UZaX9GfsQSL-yO0UBw8vxCfdcof7tat9AoYXFh3_5iyDY57v3C-d1nrPP7rt2lVVcBqnkY5VQ4nSWCRy5RPGxpoZWJjZRWMKZlEGeB1S52Gj1vbDGYcWEmosAomwnkEg7xiuN-gyXBeeJXlOycTc90OGdBVOj8oiPlFKn7oL5ILar1kPv45KWYelJDX_93hTN---FKtvB0nR-wUlFUclpiahUW7HANbm7t5PHJF0-SdpndTpDukn6ZRW7N9GklgU5wR_JHPCQfkfabsuOj6woR5DTPfWH_OtzPxXAbsDgcDe0mEGW5zpxpGccwPndI-5RIMqkYM0jQItmAoLZMqiutct8y4ymdqSx7Y6ZozNQbM31twMH0l-dSqOOrj5u1udNqzU7SGcIacFhPwez1p4NtfT3YLix3764u08te_2IbviPhkmWqWRMW8_Efu4OkJlc_CyQReJg3dN8BghUHug
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlZ3PS8MwFMeDKIgexJ84nZqDJyWsTdM2PY7pmL_GFAe7heYXCKMbWwX9731Z21VFBa9tmsNL8vJJ33vfIHQeKMl1on3CDQ0JU9YQrpVPFE-dupP0bOCKkx_6UW_IbkfhqLzndF5lu1chyaKmwak0ZXlrqm2rLnwDjHB5QDFxfEAAItfAG_tuWg9pu3LFEZDjIqzM4og46bYqrPlTF183ppo2vwVIF_tOdxttlcCI28UI76AVk-2izU8ygnvo8cnMX8ausBF3isxzDCiK-0WGt9HLp6U8OQZv4X6_4HyCO-_SzFqDcrRwO89d0f0-Gnavnzs9Ul6VQFTgRzlhVqUJCyKbyMAPFVNSx5pzwyhV3ItTzygbWwU4ERs4oVk_ZZGnpUkZAJKFRXiAVrNJZg4RliZQqdWhthTOzhaQTLIk5ZJSDfAU8QbyKjsJVeqIu-ssxqJWQHamFWBa4Uwr3hroYvnJtBDR-KtxszK-KNfTXNDEyfrDWdBroMtqQOrXv3Z29K_WZ2h9cNUV9zf9u2O0AWjEi6SwJlrNZ6_mBPAjl6eLKfYBAqzSTA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Resilient+Control+for+Networked+Control+Systems+Subject+to+Cyber%2FPhysical+Attacks&rft.jtitle=International+journal+of+automation+and+computing&rft.au=Rhouma%2C+Taouba&rft.au=Chabir%2C+Karim&rft.au=Abdelkrim%2C+Mohamed+Naceur&rft.date=2018-06-01&rft.pub=Institute+of+Automation%2C+Chinese+Academy+of+Sciences&rft.issn=1476-8186&rft.eissn=1751-8520&rft.volume=15&rft.issue=3&rft.spage=345&rft.epage=354&rft_id=info:doi/10.1007%2Fs11633-017-1059-x&rft.externalDocID=10_1007_s11633_017_1059_x
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1476-8186&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1476-8186&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1476-8186&client=summon