five

Verification paths.

收藏
Figshare2024-12-09 更新2026-04-28 收录
下载链接:
https://figshare.com/articles/dataset/Verification_paths_/27994879
下载链接
链接失效反馈
官方服务:
资源简介:
This study addresses the problem of attack identification in discrete event systems modeled with Petri nets, focusing specifically on sensor attacks that mislead observers to making incorrect decisions. Insertion attacks are one of the sensor attacks that are considered in this work. First, we formulate a novel observation structure to systematically model insertion attacks within the Petri net framework. Second, by generating an extended reachability graph that incorporates the observation structure, we can find a special class of markings whose components can have negative markings. Third, an observation place is computed by formulating an integer linear programming problem, enabling precise detection of attack occurrences. The occurrence of an attack can be identified by the number of tokens in the designed observation place. Finally, examples are provided to verify the proposed approach. Comparative analysis with existing techniques demonstrates that the reported approach offers enhanced detection accuracy and robustness, making it a significant advancement in the field of secure discrete event systems.
创建时间:
2024-12-09
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作