Title
Two-Loop Covert Attacks Against Constant Value Control of Industrial Control Systems.
Abstract
In the field of covert data integrity attacks, considerable attention has focused on two important issues. One is the issue of how to change the state of a plant, and the other is how to avoid being detected by anomaly detectors. A two-loop covert attack is presented to provide an integrated solution for these two issues. As an exploratory attempt to establish the feasibility of machine learning-b...
Year
DOI
Venue
2019
10.1109/TII.2018.2819677
IEEE Transactions on Industrial Informatics
Keywords
Field
DocType
Steady-state,Support vector machines,Informatics,Security,Detectors,Control systems,Approximation algorithms
Approximation algorithm,Least squares support vector machine,Computer security,Computer science,Support vector machine,Covert,Real-time computing,Industrial control system,Data integrity,Control system
Journal
Volume
Issue
ISSN
15
2
1551-3203
Citations 
PageRank 
References 
0
0.34
0
Authors
3
Name
Order
Citations
PageRank
Weize Li1131.66
Lun Xie22710.06
xie310636.98