no code implementations • 11 Jul 2022 • Sribalaji C. Anand, André M. H. Teixeira, Anders Ahlén
The numerical example also illustrates that the security allocation using the Value-at-risk, and the impact on the nominal system may have different outcomes: thereby depicting the benefit of using risk metrics.
no code implementations • 8 Oct 2022 • Anh Tung Nguyen, Sribalaji C. Anand, André M. H. Teixeira
The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector.
no code implementations • 14 Nov 2022 • Mohamed Abdalmoaty, Sribalaji C. Anand, André M. H. Teixeira
We consider an adversary which first learns the system dynamics (privacy) using system identification techniques, and then performs a data injection attack (security).
no code implementations • 4 Apr 2023 • Sribalaji C. Anand, André M. H. Teixeira
This article considers the problem of risk-optimal allocation of security measures when the actuators of an uncertain control system are under attack.
no code implementations • 12 Apr 2023 • Anh Tung Nguyen, Sribalaji C. Anand, André M. H. Teixeira, Alexander Medvedev
This paper proposes a game-theoretic method to address the problem of optimal detector placement in a networked control system under cyber-attacks.
no code implementations • 31 Aug 2023 • Anh Tung Nguyen, André M. H. Teixeira, Alexander Medvedev
This paper considers the problem of security allocation in a networked control system under stealthy attacks.
no code implementations • 8 Dec 2023 • Sribalaji C. Anand, Michelle S. Chong, André M. H. Teixeira
Then, a data-driven algorithm is proposed to identify the attack-free sensors when the plant is controlled online.