DOI

Control systems are exposed to unintentional errors, deliberate intrusions, false
data injection attacks, and various other disruptions. In this paper we propose, justify, and illustrate a rule of thumb for detecting, or confirming the absence of, such disruptions. To facilitate the use of the rule, we rigorously discuss underlying results that delineate the boundaries of the rule’s applicability. We also discuss ways to further widen the applicability of the proposed intrusion-detection methodology
Язык оригиналаанглийский
Страницы (с-по)1285-1304
Число страниц20
ЖурналJournal of Statistics & Management Systems
Том23
Номер выпуска8
Дата раннего онлайн-доступа3 июл 2020
DOI
СостояниеОпубликовано - 2020

    Предметные области Scopus

  • Математика (все)

    Области исследований

  • Cntrol system, Transfer function, Intrusion, Vulnerability, False data injection

ID: 45753501