Abstract: This article studies the problem of designing the optimal strictly stealthy attack against remote state estimation in cyber-physical systems, where the attacker possesses both the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results