Skip to main content

Table 5 Representative control-theoretic results on cyber-physical attacks

From: On the use of watermark-based schemes to detect cyber-physical attacks

Attack name

References

Replay attack

[5,47,48]

Dynamic false-data injection attack

[35,49]

Stealth / false-data injection attack (bias, surge, geometric)

[48,50 – 53]

Covert attack

[16,54]