Keyphrases
Sensor Deception Attacks
92%
Supervisory Control
78%
Discrete Event Systems
75%
Attacker
51%
Sensor Readings
49%
Control System
47%
Cyber-physical Systems
34%
Permissiveness
30%
Model Predictive Control
30%
Controller
30%
Supervisory Layer
28%
Deception Attacks
20%
Intrusion Detection
19%
Control Framework
18%
Manufacturing Systems
18%
Physical Systems
18%
Control Problem
17%
Solution Methodology
17%
Feedback Control System
17%
Attack Structure
16%
Safety Envelope
15%
Environmental Assumptions
15%
Fare Collection
15%
Environmental Envelope
15%
Location Privacy
15%
Electronic Voting Machine
15%
Safety Verification
15%
Original Environment
15%
Pump Device
15%
Behavioral Design
15%
Robustification
15%
Indoor Location
15%
Labelled Transition Systems
15%
Pareto Optimality
15%
Sensor-actuators
15%
Efficient Synthesis
15%
Feature Interaction
15%
Uniform Approach
15%
Stealthy Deception Attacks
15%
Resilient
15%
Temporal Logic Specification
15%
Probabilistic Discrete Event System
15%
Cyberphysical Systems
15%
Failed Attacks
15%
Moving Target Defense
15%
Opacity
15%
Actuator
15%
Software-intensive Systems
15%
Detection Probability
15%
Event-based Systems
15%
Computer Science
Attackers
100%
discrete-event system
96%
Sensor Reading
73%
Desired Property
53%
Automaton
38%
Predictive Model
30%
Attack Strategy
30%
Cyber Physical Systems
29%
Control Theory
28%
Temporal Logic
26%
Case Study
26%
Timed Automaton
20%
Modeling Error
19%
Controlled System
19%
Control Strategy
18%
Control Framework
18%
Physical System
18%
Intensive System
15%
Transition System
15%
Feature Interaction
15%
Case Time Complexity
15%
Risk Tolerance
15%
Indoor Location
15%
Sufficient Condition
15%
Multiobjective
15%
Invariance Property
15%
Requirement Engineering
15%
Discrete System
15%
Time Complexity
15%
Sensors and Actuator
15%
Actuator
15%
Moving Target Defense
15%
Successful Attack
15%
System Analysis
15%
Location Privacy
15%
Obfuscation
15%
Feedback Loop
15%
Quality Attribute
15%
Trajectory Planning
11%
System Requirement
11%
Multi-Objective Optimization
10%
Optimization Problem
10%
Attack Model
10%
maximum-likelihood
10%
Mitigation Strategy
10%
Utility Function
9%
Discrete Transition
8%
Motion Planning
7%