Statistical Approach to Detection of Attacks for Stochastic Cyber-Physical Systems
暂无分享,去创建一个
[1] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[2] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[3] Robert M. Gray,et al. Probability, Random Processes, And Ergodic Properties , 1987 .
[4] Marios M. Polycarpou,et al. A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.
[5] J. Norris. Appendix: probability and measure , 1997 .
[6] Allen Gersho,et al. Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.
[7] Mi-Ching Tsai,et al. Robust and Optimal Control , 2014 .
[8] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[9] Juan Pablo Conti,et al. The day the samba stopped , 2010 .
[10] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[11] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[12] C. L. DeMarco,et al. The potential for malicious control in a competitive power systems environment , 1996, Proceeding of the 1996 IEEE International Conference on Control Applications IEEE International Conference on Control Applications held together with IEEE International Symposium on Intelligent Contro.
[13] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[14] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[15] Monish Puthran,et al. Smart Traffic Signal , 2015 .
[16] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[17] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[18] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[19] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[20] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[21] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[22] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[23] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[24] T. M. Chen,et al. Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..
[25] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[26] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[27] R. Bass,et al. Review: P. Billingsley, Convergence of probability measures , 1971 .
[28] Larry Wasserman,et al. All of Statistics: A Concise Course in Statistical Inference , 2004 .
[29] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[30] Achim Klenke,et al. Probability theory - a comprehensive course , 2008, Universitext.
[31] Yanan Fan,et al. Multivariate nonparametric test of independence , 2017, J. Multivar. Anal..
[32] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .