Abstract— We study the SIRS (Susceptible-InfectedRecovered-Susceptible) spreading processes over complex networks, by considering its exact 3n -state Markov chain model. The Mark...
— Our prior work has studied the enforcement of opacity, a security property, using insertion functions that insert fictitious events at the output of the system, thereby preven...
We use symmetry to reduce the computational complexity of designing parameter-dependent controllers and Lyapunov functions. We propose three complementary methods for exploiting s...
Abstract— In this paper, we address the resilient state estimation problem for some relatively unexplored security issues for cyber-physical systems, namely switching attacks and...