<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10073625> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/title> "Distributed Detection of Covert Attacks for Interconnected Systems"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/abstract> "The problem of covert attacks detection in a network of interconnected subsystems is addressed in this paper. Existing approaches in the area of covert attacks detection have been devoted to centralized systems and are mainly based on mismatch between the attacker’s model and the actual plant. Instead, in this paper, we consider a large-scale system where the attacker has full knowledge on the subsystems models. By using the information received from neighboring subsystems and by exploiting the mismatch between a distributed Luenberger observer and a decentralized unknown input observer,\r\nwe propose a local detection strategy allowing each subsystem to detect anomalies in its neighborhood. The effectiveness of the proposed strategy is shown in a numerical example."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/date> "2019-06-28" .
<https://discovery.ucl.ac.uk/id/document/896059> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/volume> "2019" .
<https://discovery.ucl.ac.uk/id/org/ext-af0a9a5baed87c407844a3f5db44597c> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-af0a9a5baed87c407844a3f5db44597c> <http://xmlns.com/foaf/0.1/name> "IEEE"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-af0a9a5baed87c407844a3f5db44597c> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-269ffe5beac15ceed5f481cd2083c9a4> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10073625#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10073625#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-269ffe5beac15ceed5f481cd2083c9a4> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-eed02dbb4c7fed18f859677eb30c22e8> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10073625#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10073625#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-eed02dbb4c7fed18f859677eb30c22e8> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-3ddd423b6f077d8f614b3ead1e369423> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10073625#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10073625#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_3> <https://discovery.ucl.ac.uk/id/person/ext-3ddd423b6f077d8f614b3ead1e369423> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-f95aebecfbcf11cd1de97f011f2abfdf> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10073625#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10073625#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_4> <https://discovery.ucl.ac.uk/id/person/ext-f95aebecfbcf11cd1de97f011f2abfdf> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.loc.gov/loc.terms/relators/EDT> <https://discovery.ucl.ac.uk/id/person/ext-e6892e244c64e3b0218f5cd3bc36fbb1> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/editorList> <https://discovery.ucl.ac.uk/id/eprint/10073625#editors> .
<https://discovery.ucl.ac.uk/id/eprint/10073625#editors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-e6892e244c64e3b0218f5cd3bc36fbb1> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.loc.gov/loc.terms/relators/EDT> <https://discovery.ucl.ac.uk/id/person/ext-80ed4608364f0be2f414b7a9ddc4afc4> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/editorList> <https://discovery.ucl.ac.uk/id/eprint/10073625#editors> .
<https://discovery.ucl.ac.uk/id/eprint/10073625#editors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_2> <https://discovery.ucl.ac.uk/id/person/ext-80ed4608364f0be2f414b7a9ddc4afc4> .
<https://discovery.ucl.ac.uk/id/person/ext-269ffe5beac15ceed5f481cd2083c9a4> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-269ffe5beac15ceed5f481cd2083c9a4> <http://xmlns.com/foaf/0.1/givenName> "A"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-269ffe5beac15ceed5f481cd2083c9a4> <http://xmlns.com/foaf/0.1/familyName> "Barboni"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-269ffe5beac15ceed5f481cd2083c9a4> <http://xmlns.com/foaf/0.1/name> "A Barboni"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-80ed4608364f0be2f414b7a9ddc4afc4> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-80ed4608364f0be2f414b7a9ddc4afc4> <http://xmlns.com/foaf/0.1/givenName> "Luigi"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-80ed4608364f0be2f414b7a9ddc4afc4> <http://xmlns.com/foaf/0.1/familyName> "Glielmo"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-80ed4608364f0be2f414b7a9ddc4afc4> <http://xmlns.com/foaf/0.1/name> "Luigi Glielmo"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-eed02dbb4c7fed18f859677eb30c22e8> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-eed02dbb4c7fed18f859677eb30c22e8> <http://xmlns.com/foaf/0.1/givenName> "H"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-eed02dbb4c7fed18f859677eb30c22e8> <http://xmlns.com/foaf/0.1/familyName> "Rezaee"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-eed02dbb4c7fed18f859677eb30c22e8> <http://xmlns.com/foaf/0.1/name> "H Rezaee"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-e6892e244c64e3b0218f5cd3bc36fbb1> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-e6892e244c64e3b0218f5cd3bc36fbb1> <http://xmlns.com/foaf/0.1/givenName> "Franco"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-e6892e244c64e3b0218f5cd3bc36fbb1> <http://xmlns.com/foaf/0.1/familyName> "Garofalo"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-e6892e244c64e3b0218f5cd3bc36fbb1> <http://xmlns.com/foaf/0.1/name> "Franco Garofalo"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3ddd423b6f077d8f614b3ead1e369423> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-3ddd423b6f077d8f614b3ead1e369423> <http://xmlns.com/foaf/0.1/givenName> "F"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3ddd423b6f077d8f614b3ead1e369423> <http://xmlns.com/foaf/0.1/familyName> "Boem"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-3ddd423b6f077d8f614b3ead1e369423> <http://xmlns.com/foaf/0.1/name> "F Boem"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-f95aebecfbcf11cd1de97f011f2abfdf> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-f95aebecfbcf11cd1de97f011f2abfdf> <http://xmlns.com/foaf/0.1/givenName> "T"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-f95aebecfbcf11cd1de97f011f2abfdf> <http://xmlns.com/foaf/0.1/familyName> "Parisini"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-f95aebecfbcf11cd1de97f011f2abfdf> <http://xmlns.com/foaf/0.1/name> "T Parisini"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/ontology/bibo/presentedAt> <https://discovery.ucl.ac.uk/id/event/ext-7ff07479128293df88c87b37c4873447> .
<https://discovery.ucl.ac.uk/id/event/ext-7ff07479128293df88c87b37c4873447> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Conference> .
<https://discovery.ucl.ac.uk/id/event/ext-7ff07479128293df88c87b37c4873447> <http://purl.org/dc/terms/title> "European Control Conference 2019, 25-28 Jun 2019, Naples, Italy"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ProceedingsSectionEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896059> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896059> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasAccepted> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896059> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10073625/1/ECC19_0341_FI.pdf> .
<https://discovery.ucl.ac.uk/id/document/896059> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10073625/1/ECC19_0341_FI.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10073625/1/ECC19_0341_FI.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "ECC19_0341_FI.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896061> .
<https://discovery.ucl.ac.uk/id/document/896061> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896061> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896061> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896061> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896061> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896062> .
<https://discovery.ucl.ac.uk/id/document/896062> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896062> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896062> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896062> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896062> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896063> .
<https://discovery.ucl.ac.uk/id/document/896063> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896063> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896063> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896063> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896063> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896064> .
<https://discovery.ucl.ac.uk/id/document/896064> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896064> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896064> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896064> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896064> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896065> .
<https://discovery.ucl.ac.uk/id/document/896065> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896065> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896065> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896065> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896065> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896066> .
<https://discovery.ucl.ac.uk/id/document/896066> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896066> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896066> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896066> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896066> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/896067> .
<https://discovery.ucl.ac.uk/id/document/896067> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/896067> <http://www.w3.org/2000/01/rdf-schema#label> "Distributed Detection of Covert Attacks for Interconnected Systems (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/896067> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896067> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/document/896067> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/896059> .
<https://discovery.ucl.ac.uk/id/eprint/10073625> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10073625/> .
<https://discovery.ucl.ac.uk/id/eprint/10073625/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10073625 \n\nDistributed Detection of Covert Attacks for Interconnected Systems\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10073625/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10073625/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10073625> .