Secure trajectory planning against undetectable spoofing attacks
暂无分享,去创建一个
[1] G. Fairweather,et al. Numerical Methods for Two – Point Boundary Value Problems , 2008 .
[2] João P. Hespanha,et al. Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks , 2019, 2019 American Control Conference (ACC).
[3] Paulo Tabuada,et al. Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[4] Paulo Tabuada,et al. Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] Peter F. Swaszek,et al. GNSS Spoof Detection Using Shipboard IMU Measurements , 2014 .
[6] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[7] Claire J. Tomlin,et al. Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.
[8] H. Keller. Numerical Methods for Two-Point Boundary-Value Problems , 1993 .
[9] Todd E. Humphreys,et al. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..
[10] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[11] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[12] S. Brendle,et al. Calculus of Variations , 1927, Nature.
[13] Todd E. Humphreys,et al. GPS Spoofing Detection via Dual-Receiver Correlation of Military Signals , 2013, IEEE Transactions on Aerospace and Electronic Systems.
[14] Raffaello D'Andrea,et al. Path Planning for Unmanned Aerial Vehicles in Uncertain and Adversarial Environments , 2003 .
[15] Alejandro D. Dominguez-Garcia,et al. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units , 2013, IEEE Transactions on Power Systems.
[16] T. Başar,et al. Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .
[17] Todd E. Humphreys,et al. GNSS Spoofing Detection Using Two-Antenna Differential Carrier Phase , 2014 .
[18] G. Oriolo,et al. Robotics: Modelling, Planning and Control , 2008 .
[19] Peter F. Swaszek,et al. GNSS Spoof Detection Based on Pseudoranges from Multiple Receivers , 2015 .
[20] Todd E. Humphreys,et al. Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense against a Portable Civil GPS Spoofer , 2009 .
[21] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[22] W. Chan,et al. Numerical computation of optimal control problems with unknown final time , 1974 .
[23] Maria Domenica Di Benedetto,et al. Cyber-Physical Systems Security: a Systematic Mapping Study , 2016, J. Syst. Softw..
[24] Suresh P. Sethi,et al. A Survey of the Maximum Principles for Optimal Control Problems with State Constraints , 1995, SIAM Rev..
[25] Fabio Pasqualetti,et al. Secure Navigation of Robots in Adversarial Environments , 2020, IEEE Control Systems Letters.
[26] Steven M. LaValle,et al. Planning algorithms , 2006 .
[27] Rogelio Lozano,et al. Energy based control of the Pendubot , 2000, IEEE Trans. Autom. Control..
[28] Ali Broumandan,et al. GNSS spoofing detection in handheld receivers based on signal spatial correlation , 2012, Proceedings of the 2012 IEEE/ION Position, Location and Navigation Symposium.
[29] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[30] Ming Cong,et al. Detection of GPS spoofing based on UAV model estimation , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.
[31] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[32] Hyungbo Shim,et al. Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors , 2018, IEEE Transactions on Automatic Control.