no code implementations • 14 Nov 2022 • Mohamed Abdalmoaty, Sribalaji C. Anand, André M. H. Teixeira
We consider an adversary which first learns the system dynamics (privacy) using system identification techniques, and then performs a data injection attack (security).
no code implementations • 8 Oct 2022 • Anh Tung Nguyen, Sribalaji C. Anand, André M. H. Teixeira
The problem is formulated as a zero-sum game with two players, namely a malicious adversary and a detector.
no code implementations • 11 Jul 2022 • Sribalaji C. Anand, André M. H. Teixeira, Anders Ahlén
The numerical example also illustrates that the security allocation using the Value-at-risk, and the impact on the nominal system may have different outcomes: thereby depicting the benefit of using risk metrics.