Prefer a chat interface with context about you and your work?
Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems
This paper studies an attacker against a cyber-physical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker's probability of being detected is related to the …