Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the history of diagnosability and opacity in discrete event systems
This paper presents historical remarks on key projects and papers that led to the
development of a theory of event diagnosis for discrete event systems modeled by finite …
development of a theory of event diagnosis for discrete event systems modeled by finite …
Overview of discrete event systems opacity: Models, validation, and quantification
Over the last decade, opacity of discrete event systems (DES) has become a very fertile field
of research. Driven by safety and privacy concerns in network communications and online …
of research. Driven by safety and privacy concerns in network communications and online …
Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
R Su - Automatica, 2018 - Elsevier
One of the major challenges about cyber–physical systems is how to protect system integrity
from cyber attacks. There has been a large number of different types of attacks discussed in …
from cyber attacks. There has been a large number of different types of attacks discussed in …
A uniform approach for synthesizing property-enforcing supervisors for partially-observed discrete-event systems
The problem under consideration in this paper is that of enforcement by supervisory control
of a given property on a partially-observed discrete-event system. We present a general …
of a given property on a partially-observed discrete-event system. We present a general …
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Comparative analysis of related notions of opacity in centralized and coordinated architectures
Opacity is a confidentiality property that captures whether an intruder can infer a “secret” of a
system based on its observation of the system behavior and its knowledge of the system's …
system based on its observation of the system behavior and its knowledge of the system's …
Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security
Abstract System resilience captures the ability of the system to withstand a major disruption
within acceptable performance degradation and to recover within an acceptable time frame …
within acceptable performance degradation and to recover within an acceptable time frame …
A new approach for the verification of infinite-step and K-step opacity using two-way observers
In the context of security analysis for information flow properties, where a potentially
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …
malicious observer (intruder) tracks the observed behavior of a given system, infinite-step …
Verification of -Step Opacity and Analysis of Its Complexity
A Saboori, CN Hadjicostis - IEEE Transactions on Automation …, 2011 - ieeexplore.ieee.org
Motivated by security and privacy considerations in a variety of applications of discrete event
systems, we describe and analyze the computational complexity required for verifying the …
systems, we describe and analyze the computational complexity required for verifying the …
Supervisory control of discrete-event systems under attacks
We consider a multi-adversary version of the supervisory control problem for discrete-event
systems (DES), in which an adversary corrupts the observations available to the supervisor …
systems (DES), in which an adversary corrupts the observations available to the supervisor …