Title | ||
---|---|---|
Two-Loop Covert Attacks Against Constant Value Control of Industrial Control Systems. |
Abstract | ||
---|---|---|
In the field of covert data integrity attacks, considerable attention has focused on two important issues. One is the issue of how to change the state of a plant, and the other is how to avoid being detected by anomaly detectors. A two-loop covert attack is presented to provide an integrated solution for these two issues. As an exploratory attempt to establish the feasibility of machine learning-b... |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/TII.2018.2819677 | IEEE Transactions on Industrial Informatics |
Keywords | Field | DocType |
Steady-state,Support vector machines,Informatics,Security,Detectors,Control systems,Approximation algorithms | Approximation algorithm,Least squares support vector machine,Computer security,Computer science,Support vector machine,Covert,Real-time computing,Industrial control system,Data integrity,Control system | Journal |
Volume | Issue | ISSN |
15 | 2 | 1551-3203 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |