Abstract: Modeling and computer simulation are effective tools for predicting system behavior. However, simulation software (i.e., source codes), particularly those on social systems, tends to be ...
Abstract: This paper investigates stealthy false data injection attacks in cyber-physical systems (CPSs) and develops an optimal linear attack scheme utilizing both local and remote sensors. The ...