Searched for: +
(1 - 5 of 5)
document
Gallo, A.J. (author), Anand, S.C. (author), Teixeira, Andre M. H. (author), Ferrari, Riccardo M.G. (author)
This paper addresses the design of an active cyberattack detection architecture based on multiplicative watermarking, allowing for detection of covert attacks. We propose an optimal design problem, relying on the so-called output-to-output ℓ 2 -gain, which characterizes the maximum gain between the residual output of a detection scheme and some...
conference paper 2021
document
Ferrari, Riccardo M.G. (author), Teixeira, Andre M.H. (author)
This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authentication schemes with weak cryptographic guarantees, we propose a watermarking approach to validate the data and its source. In particular, we propose a multiplicative scheme, where the sensor outputs are watermarked by a bank of filters, then...
journal article 2021
document
Rostampour, Vahab (author), Ferrari, Riccardo M.G. (author), Teixeira, Andre M.H. (author), Keviczky, T. (author)
In this article two limitations in current distributed model based approaches for anomaly detection in large-scale uncertain nonlinear systems are addressed. The first limitation regards the high conservativeness of deterministic detection thresholds, against which a novel family of set-based thresholds is proposed. Such set-based thresholds...
journal article 2020
document
Rostampour, Vahab (author), Ferrari, Riccardo M.G. (author), Teixeira, André M.H. (author), Keviczky, T. (author)
Distributed fault diagnosis has been proposed as an effective technique for monitoring large scale, nonlinear and uncertain systems. It is based on the decomposition of the large scale system into a number of interconnected subsystems, each one monitored by a dedicated Local Fault Detector (LFD). Neighboring LFDs, in order to successfully...
journal article 2018
document
Teixeira, Andre M.H. (author), Ferrari, Riccardo M.G. (author)
In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is considered. We propose a multiplicative watermarking scheme, where each sensor’s output is individually fed to a SISO watermark generator whose parameters are supposed to be unknown to the adversary. Under such a scenario, the detectability...
conference paper 2018
Searched for: +
(1 - 5 of 5)