Cedric Escudero

According to our database1, Cedric Escudero authored at least 12 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Stealthy Attack Design Using Sequential Linear Programming.
Proceedings of the 32nd Mediterranean Conference on Control and Automation, 2024

Actuator and Sensor Attacks Detection Method based on Attack Reconstruction.
Proceedings of the 32nd Mediterranean Conference on Control and Automation, 2024

Temporal Assessment of Malicious Behaviors: Application to Turnout Field Data Monitoring.
Proceedings of the International Conference on Control, Automation and Diagnosis, 2024

2023
Safety monitoring under stealthy sensor injection attacks using reachable sets.
CoRR, 2023

Cyber Threat Assessment in Monitoring Turnout Railway Systems.
Proceedings of the 28th IEEE International Conference on Emerging Technologies and Factory Automation, 2023

Safety-Preserving Filters Against Stealthy Sensor and Actuator Attacks.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2022
Enforcing Safety under Actuator Injection Attacks through Input Filtering.
Proceedings of the European Control Conference, 2022

2021
Enforcing Safety under Actuator Attacks through Input Filtering.
CoRR, 2021

2020
Aging Attacks against Electro-Mechanical Actuators from Control Signal Manipulation.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

Process-Aware Model-based Intrusion Detection System on Filtering Approach: Further Investigations.
Proceedings of the 2020 IEEE International Conference on Industrial Technology, 2020

2018
Process-Aware Model based IDSs for Industrial Control Systems Cybersecurity: Approaches, Limits and Further Research.
Proceedings of the 23rd IEEE International Conference on Emerging Technologies and Factory Automation, 2018

From ICS Attacks' Analysis to the S.A.F.E. Approach: Implementation of Filters Based on Behavioral Models and Critical State Distance for ICS Cybersecurity.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018


  Loading...