Sequential detection of replay attacks

A Naha, A Teixeira, A Ahlén… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
One of the most studied forms of attacks on the cyber-physical systems is the replay attack.
The statistical similarities of the replayed signal and the true observations make the replay …

Replay attack detection for cyber-physical control systems: A dynamical delay estimation method

D Zhao, B Yang, Y Li, H Zhang - IEEE Transactions on Industrial …, 2024 - ieeexplore.ieee.org
Cyber attack detection plays a crucial role in ensuring cyber security of control systems.
However, the reported methods for cyber attack detection often rely on large-scale upgrades …

[HTML][HTML] Quickest detection of deception attacks on cyber–physical systems with a parsimonious watermarking policy

A Naha, AMH Teixeira, A Ahlén, S Dey - Automatica, 2023 - Elsevier
Adding a physical watermarking signal to the control input of a networked control system
increases the detection probability of data deception attacks at the expense of increased …

Integrated approach to diagnostics of failures and cyber-attacks in industrial control systems

M Syfert, A Ordys, JM Kościelny, P Wnuk, J Możaryn… - Energies, 2022 - mdpi.com
This paper is concerned with the issue of the diagnostics of process faults and the detection
of cyber-attacks in industrial control systems. This problem is of significant importance to …

Controller cyber-attack detection and isolation

A Sztyber-Betley, M Syfert, JM Kościelny, Z Górecka - Sensors, 2023 - mdpi.com
This article deals with the cyber security of industrial control systems. Methods for detecting
and isolating process faults and cyber-attacks, consisting of elementary actions named …

Replay attack detection based on parity space method for cyber-physical systems

D Zhao, Y Shi, SX Ding, Y Li… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The replay attack detection problem is studied from a new perspective based on the parity
space method in this paper. The proposed detection methods can distinguish system fault …

Detection and analysis of cybersecurity challenges for processing systems

L Liu, Z Sajid, C Kravaris, F Khan - Process Safety and Environmental …, 2024 - Elsevier
Due to cyber threats, Process Control Systems (PCS) are increasingly at risk in the
interconnected world. This review elucidates PCS's mounting cybersecurity challenges …

Resilient Event Triggered Interval Type‐2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks

A Mohammed, C Ramlal, L Marine… - Journal of Advanced …, 2024 - Wiley Online Library
Connected and autonomous vehicles (CAVs) are considered a hot area of research in the
field of intelligent transportation systems. However, over the past few years, cybersecurity …

Machine Learning based Early Detection of Ongoing Cyber-Attacks

A Bhagyalakshmi, CDS Laya… - … on Applied Artificial …, 2024 - ieeexplore.ieee.org
The need for sophisticated detection and response systems to counteract cyber threats has
grown in importance as the cybersecurity landscape changes. In order to improve …

Deception attack detection using reduced watermarking

A Naha, A Teixeira, A Ahlén… - 2021 European control …, 2021 - ieeexplore.ieee.org
The addition of physical watermarking to the control input is a well-adopted technique to
detect the data deception attacks on the cyber-physical systems. However, the addition of …