An algebraic detection approach for control systems under multiple stochastic cyber-attacks
暂无分享,去创建一个
Changchun Hua | Mohamed Darouach | Holger Voos | Yumei Li | M. Darouach | C. Hua | H. Voos | Yumei Li
[1] Ramesh Chandra Joshi,et al. Dual-Level Attack Detection and Characterization for Networks under DDoS , 2010, 2010 International Conference on Availability, Reliability and Security.
[2] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[3] Mohamed Darouach,et al. A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique , 2014, NSS.
[4] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[5] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[6] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[7] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[8] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[9] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[10] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[11] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[12] Mohamed Darouach,et al. A model predictive approach for cyber-attack detection and mitigation in control systems , 2013, 52nd IEEE Conference on Decision and Control.
[13] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[14] Karl Henrik Johansson,et al. Cyber-security of SCADA systems , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[15] Soummya Kar,et al. Distributed detection and isolation of topology attacks in power networks , 2012, HiCoNS '12.
[16] Karl Henrik Johansson,et al. The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..
[17] A. Jamalipour,et al. Detection of DoS and DDoS attacks in NGMN using frequency domain analysis , 2008, 2008 14th Asia-Pacific Conference on Communications.
[18] André Teixeira,et al. Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.
[19] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[20] Marios M. Polycarpou,et al. A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.
[21] Emanuele Garone,et al. False Data Injection Attacks for State Estimation in Cyber-Physical Systems , 2010, CDC 2010.