Searched for: +
(1 - 8 of 8)
document
Pan, K. (author), Herdeiro Teixeira, A.M. (author), López, Claudio (author), Palensky, P. (author)
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data...
conference paper 2018
document
Herdeiro Teixeira, A.M. (author), Araujo, Jose (author), Sandberg, Henrik (author), Johansson, Karl H. (author)
In this paper, we address the problem of distributed reconfiguration of networked control systems upon the removal of misbehaving sensors and actuators. In particular, we consider systems with redundant sensors and actuators cooperating to recover from faults. Reconfiguration is performed while minimizing a steady-state estimation error...
journal article 2017
document
Ma, M. (author), Herdeiro Teixeira, A.M. (author), van den Berg, Jan (author), Palensky, P. (author)
Low-voltage distribution grids experience a rising penetration of inverter-based, distributed generation. In order to not only contribute to but also solve voltage problems, these inverters are increasingly asked to participate in intelligent grid controls. Communicating inverters implement distributed voltage droop controls. The impact of...
journal article 2017
document
Ferrari, Riccardo M.G. (author), Herdeiro Teixeira, A.M. (author)
This paper addresses the detection and isolation of replay attacks on sensor measurements. As opposed to previously proposed additive watermarking, we propose a multiplicative watermarking scheme, where each sensor's output is separately watermarked by being fed to a SISO watermark generator. Additionally, a set of equalizing filters is...
conference paper 2017
document
Ferrari, Riccardo M.G. (author), Herdeiro Teixeira, A.M. (author)
In networked control systems, leveraging the peculiarities of the cyber-physical domains and their interactions may lead to novel detection and defense mechanisms against malicious cyber-attacks. In this paper, we propose a multiplicative sensor watermarking scheme, where each sensor's output is separately watermarked by a Single Input Single...
conference paper 2017
document
Chockalingam, S. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author), van Gelder, P.H.A.J.M. (author)
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and analysis of these models is missing. In this paper, we conduct a...
conference paper 2017
document
Herdeiro Teixeira, A.M. (author), Sandberg, H (author)
In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources necessary for targeted attacks to be undetectable and...
conference paper 2016
document
Fichtner, L.V.E. (author), Pieters, W. (author), Herdeiro Teixeira, A.M. (author)
In the cybersecurity community it is common to think of security as a design feature for systems and infrastructures that may be difficult to balance with other requirements. What is less studied is how security requirements come about, for which reasons, and what their influence is on the actions the system facilitates. Security is for example...
conference paper 2016
Searched for: +
(1 - 8 of 8)