Optimal Injection Attack for UCPS Under Vertical Depth-Keeping Task Via Game Approach
نویسندگان
چکیده
Dear Editor, This letter concerns about the security problem of underwater cyber-physical system (UCPS) for depth-keeping task in vertical plane. A dynamic parametric model UCPS with ocean currents and hydrostatic is considered. With intelligence controller, objective function a zero-sum game between attacker controller introduced. The destroys by injecting designed false data into system. Compared existing attack strategies, gets rid dependence on constructing virtual linear based input output (I/O) data, i.e., measurable depth pitch angle. Note that information such as pressure hydrodynamics force cannot be accessed attackers under environment. In addition, programming method adopted to solve mixed strategies framework. Finally, effectiveness this scheme verified simulation.
منابع مشابه
a benchmarking approach to optimal asset allocation for insurers and pension funds
uncertainty in the financial market will be driven by underlying brownian motions, while the assets are assumed to be general stochastic processes adapted to the filtration of the brownian motions. the goal of this study is to calculate the accumulated wealth in order to optimize the expected terminal value using a suitable utility function. this thesis introduced the lim-wong’s benchmark fun...
15 صفحه اولOptimal water quality for keeping ornamental fish in the aquarium
Ornamental fish keeping is the second most popular hobby in the world, and its popularity is growing every day. The ornamental fish farming industry provides entrepreneurship and income generation opportunities, so it is important to focus on various aspects of ornamental fish farming. Several physical and chemical parameters of water are discussed in this study, including pH, hardness, a...
متن کاملstatistical inference via empirical bayes approach for stationary and dynamic contingency tables
چکیده ندارد.
15 صفحه اولAn Approach for Preventing SQL Injection Attack on Web Application
SQL injection attacks are one of the highest dangers for applications composed for the Web. These attacks are dispatched through uncommonly made client information on web applications that utilization low level string operations to build SQL queries.SQL injection weakness permits an assailant to stream summons straightforwardly to a web application's hidden database and annihilate usefulness or...
متن کاملWireless Networks under a Backoff Attack: A Game Theoretical Perspective
We study a wireless sensor network using CSMA/CA in the MAC layer under a backoff attack: some of the sensors of the network are malicious and deviate from the defined contention mechanism. We use Bianchi's network model to study the impact of the malicious sensors on the total network throughput, showing that it causes the throughput to be unfairly distributed among sensors. We model this conf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE/CAA Journal of Automatica Sinica
سال: 2023
ISSN: ['2329-9274', '2329-9266']
DOI: https://doi.org/10.1109/jas.2023.123048