Secure Control Loop Execution of Cyber-Physical Devices Using Predictive State Space Checks
暂无分享,去创建一个
[1] Hassan N. Noura,et al. Cyber-physical systems security: Limitations, issues and future trends , 2020, Microprocessors and Microsystems.
[2] Robert B. Gramacy,et al. Surrogates: Gaussian Process Modeling, Design, and Optimization for the Applied Sciences , 2020 .
[3] Srinivas Devadas,et al. MI6: Secure Enclaves in a Speculative Out-of-Order Processor , 2018, MICRO.
[4] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[5] Yi Qian,et al. Defense Mechanisms against Data Injection Attacks in Smart Grid Networks , 2017, IEEE Communications Magazine.
[6] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[7] Sandeep K. Gupta,et al. A Resizing Method to Minimize Effects of Hardware Trojans , 2014, 2014 IEEE 23rd Asian Test Symposium.
[8] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[9] Zhihong Man,et al. Sliding Mode Control for Steer-by-Wire Systems With AC Motors in Road Vehicles , 2013, IEEE Transactions on Industrial Electronics.
[10] F. Bullo,et al. Attack Detection and Identification in Cyber-Physical Systems , 2013, IEEE Transactions on Automatic Control.
[11] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[12] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[13] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[14] Mark Mohammad Tehranipoor,et al. Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.
[15] S. Shankar Sastry,et al. Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..
[16] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[18] R. Bergman. Surrogates , 2008, Obesity.
[19] Bing Zheng,et al. An Antilock-Braking Algorithm for an Eddy-Current-Based Brake-By-Wire System , 2007, IEEE Transactions on Vehicular Technology.
[20] Uwe Kiencke,et al. Automotive Control Systems: For Engine, Driveline, and Vehicle , 2000 .
[21] R. Husson,et al. The dead reckoning localization system of the wheeled mobile robot ROMANE , 1996, 1996 IEEE/SICE/RSJ International Conference on Multisensor Fusion and Integration for Intelligent Systems (Cat. No.96TH8242).
[22] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[23] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[24] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.