Smart grid cyber security enhancement: Challenges and solutions—A review
T Alsuwian, A Shahid Butt, AA Amin - Sustainability, 2022 - mdpi.com
The incorporation of communication technology with Smart Grid (SG) is proposed as an
optimal solution to fulfill the requirements of the modern power system. A smart grid …
optimal solution to fulfill the requirements of the modern power system. A smart grid …
Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Formal synthesis of controllers for safety-critical autonomous systems: Developments and challenges
In recent years, formal methods have been extensively used in the design of autonomous
systems. By employing mathematically rigorous techniques, formal methods can provide …
systems. By employing mathematically rigorous techniques, formal methods can provide …
Differential privacy for symbolic systems with application to Markov Chains
Data-driven systems are gathering increasing amounts of data from users, and sensitive
user data requires privacy protections. In some cases, the data gathered is non-numerical or …
user data requires privacy protections. In some cases, the data gathered is non-numerical or …
Detection and identification of sparse sensor attacks in cyber-physical systems with side information
This article investigates the attack detection and identification problem for cyber-physical
systems under sparse sensor attacks. A novel candidate set construction algorithm, where …
systems under sparse sensor attacks. A novel candidate set construction algorithm, where …
Strong current-state and initial-state opacity of discrete-event systems
X Han, K Zhang, J Zhang, Z Li, Z Chen - Automatica, 2023 - Elsevier
Opacity, as an important property in information-flow security, characterizes the ability of a
system to keep some secret information from an intruder. In discrete-event systems, based …
system to keep some secret information from an intruder. In discrete-event systems, based …
A polynomial-time algorithm for the secure state estimation problem under sparse sensor attacks via state decomposition technique
This article investigates the secure state estimation problem for cyber–physical systems
(CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is …
(CPSs) under sparse sensor attacks. In the existing results, the secure state estimation is …
A general language-based framework for specifying and verifying notions of opacity
A Wintenberg, M Blischke, S Lafortune… - Discrete Event Dynamic …, 2022 - Springer
Opacity is an information flow property that captures the notion of plausible deniability in
dynamic systems, that is whether an intruder can deduce that “secret” behavior has …
dynamic systems, that is whether an intruder can deduce that “secret” behavior has …
Secure-by-construction optimal path planning for linear temporal logic tasks
In this paper, we investigate the problem of planning an optimal infinite path for a single
robot to achieve a linear temporal logic (LTL) task with security guarantee. We assume that …
robot to achieve a linear temporal logic (LTL) task with security guarantee. We assume that …
The opacity of timed automata
Opacity serves as a critical security and confidentiality property, which concerns whether an
intruder can unveil a system's secret based on structural knowledge and observed …
intruder can unveil a system's secret based on structural knowledge and observed …