Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks
暂无分享,去创建一个
Xavier Litrico | Alexandre M. Bayen | S. Shankar Sastry | Saurabh Amin | S. Sastry | A. Bayen | S. Sastry | Saurabh Amin | X. Litrico
[1] M. Darouach,et al. Full-order observers for linear systems with unknown inputs , 1994, IEEE Trans. Autom. Control..
[2] D. Koenig,et al. Unknown Input Observers Design for Time-Delay Systems Application to An Open-Channel , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[3] Tong Heng Lee,et al. A less conservative robust stability test for linear uncertain time-delay systems , 2006, IEEE Trans. Autom. Control..
[4] A. Perdon,et al. Unknown Input Observers and Residual Generators for Linear Time Delay Systems , 2006 .
[5] Iven M. Y. Mareels,et al. Control of Large-Scale Irrigation Networks , 2007, Proceedings of the IEEE.
[6] Xavier Litrico,et al. Automatic Tuning of PI Controllers for an Irrigation Canal Pool , 2007 .
[7] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[8] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[9] Xavier Litrico,et al. Modeling and Control of Hydrosystems , 2009 .
[10] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[11] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[12] Erik Weyer,et al. Algorithms for leak detection, estimation, isolation and localization in open water channels☆ , 2011 .
[13] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.