×
Abstract: The effectiveness and stealthiness analysis of sensor attacks, utilizing the reachability graph of labeled Petri nets (LPNs), typically encounters ...
This work provides a simplified LPN method via simplified structure that can be effectively reduced while still guaranteeing the attack's effectiveness and ...
Abstract—The effectiveness and stealthiness analysis of sensor attacks, utilizing the reachability graph of labeled Petri nets.
This paper addresses the problem of optimal sensor selection for ensuring diagnosability of discrete event systems. Given a nondiagnosable discrete event system ...
We first construct the stealthy attack Petri net that keeps into account the real plant evolutions observed by the attacker and the corrupted plant evolutions ...
This paper will design a model using Labeled Petri Nets and construct a reachability graph of an attacked net in order to enrich a diagnosis model which ...
Analysis of Effectiveness and Stealthiness of Sensor Attacks in Labeled Petri Nets. Shen, Chen;Liu, Gaiyun;Zhong, Chunfu;Barkaoui, Kamel.
The attacker can corrupt the sensor channels that transmit the sensor readings, making the operator incapable to establish when a critical marking is reached.
Analysis of Effectiveness and Stealthiness of Sensor Attacks in Labeled Petri Nets. 2023 · Chen Shen, Gaiyun Liu, et al. Cited by 0 · A Cyberattack Impact ...
We first construct the stealthy attack Petri net that keeps into account the real plant evolutions observed by the attacker and the corrupted plant evolutions ...