Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach
暂无分享,去创建一个
[1] Britta Hale,et al. Secure Messaging Authentication against Active Man-in-the-Middle Attacks , 2021, 2021 IEEE European Symposium on Security and Privacy (EuroS&P).
[2] Quanyan Zhu,et al. Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach , 2020 .
[3] A. Kott,et al. Modeling and Design of Secure Internet of Things , 2020 .
[4] Arvind Easwaran,et al. A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin , 2020, 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS).
[5] Quanyan Zhu. Control Challenges for Resilient Control Systems , 2020, ArXiv.
[6] Quanyan Zhu,et al. Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.
[7] Quanyan Zhu,et al. A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..
[8] Tao Zhang,et al. Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation , 2019, ArXiv.
[9] Xianbin Wang,et al. Toward Massive Machine Type Communications in Ultra-Dense Cellular IoT Networks: Current Issues and Machine Learning-Assisted Solutions , 2018, IEEE Communications Surveys & Tutorials.
[10] Dynamic Games of Asymmetric Information for Deceptive Autonomous Vehicles. , 2019, 1907.00459.
[11] Tianjian Chen,et al. Federated Machine Learning: Concept and Applications , 2019 .
[12] Quanyan Zhu,et al. Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks , 2018, IEEE Transactions on Information Forensics and Security.
[13] Quanyan Zhu,et al. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.
[14] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[15] Yongli Wei,et al. Digital twin for CNC machine tool: modeling and using strategy , 2018, Journal of Ambient Intelligence and Humanized Computing.
[16] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[17] Quanyan Zhu,et al. Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.
[18] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[19] Industrial Control Systems Security and Resiliency: Practice and Theory , 2019, Advances in Information Security.
[20] M. Pirani,et al. A systems and control perspective of CPS security , 2019, Annu. Rev. Control..
[21] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[22] Claire J. Tomlin,et al. Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..
[23] Prithviraj Dasgupta,et al. A Comprehensive Survey of Recent Trends in Cloud Robotics Architectures and Applications , 2018, Robotics.
[24] Quanyan Zhu,et al. Performance of Dynamic Secure Routing Game , 2018, Game Theory for Networking Applications.
[25] Quanyan Zhu,et al. Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).
[26] Marco Caccamo,et al. Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).
[27] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[28] Quanyan Zhu,et al. A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[29] Quanyan Zhu,et al. Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[30] Fei Tao,et al. Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.
[31] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[32] Quanyan Zhu,et al. Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[33] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[34] D. Rajan. Probability, Random Variables, and Stochastic Processes , 2017 .
[35] Quanyan Zhu,et al. A game-theoretic defense against data poisoning attacks in distributed support vector machines , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[36] Branislav Bosanský,et al. Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.
[37] Quanyan Zhu,et al. Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles , 2017, GameSec.
[38] Quanyan Zhu,et al. Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.
[39] Quanyan Zhu,et al. Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games , 2017, GameSec.
[40] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[41] Quanyan Zhu,et al. Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[42] Quanyan Zhu,et al. Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[43] Quanyan Zhu,et al. Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.
[44] Rui Zhang,et al. A game-theoretic analysis of label flipping attacks on distributed support vector machines , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[45] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[46] Branislav Bosanský,et al. Heuristic Search Value Iteration for One-Sided Partially Observable Stochastic Games , 2017, AAAI.
[47] Hemraj Saini,et al. A recent review on lightweight cryptography in IoT , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[48] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[49] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[50] Quanyan Zhu,et al. A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars , 2016, GameSec.
[51] Peter Schartner,et al. Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[52] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[53] Quanyan Zhu,et al. Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).
[54] Quanyan Zhu,et al. Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).
[55] J. O’Kane. A Gentle Introduction to ROS , 2016 .
[56] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[57] Miriam A. M. Capretz,et al. MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[58] Quanyan Zhu,et al. Environment-aware power generation scheduling in smart grids , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[59] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[60] Quanyan Zhu,et al. Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games , 2015, MIST@CCS.
[61] Marina Aguado,et al. Cyber security analysis of the European train control system , 2015, IEEE Communications Magazine.
[62] José Manuel Riera,et al. A survey on future railway radio communications services: challenges and opportunities , 2015, IEEE Communications Magazine.
[63] Darren J. Hartl,et al. Computationally Efficient Analysis of SMA Sensory Particles Embedded in Complex Aerostructures Using a Substructure Approach , 2015 .
[64] Tingwen Huang,et al. Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.
[65] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[66] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[67] Rui Zhang,et al. Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).
[68] Quanyan Zhu,et al. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.
[69] Dario Pompili,et al. Dynamic Collaboration Between Networked Robots and Clouds in Resource-Constrained Environments , 2015, IEEE Transactions on Automation Science and Engineering.
[70] Quanyan Zhu,et al. A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[71] Moritz Tenorth,et al. RoboEarth Semantic Mapping: A Cloud Enabled Knowledge-Based Approach , 2015, IEEE Transactions on Automation Science and Engineering.
[72] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[73] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[74] Karl Henrik Johansson,et al. Cyberphysical Security in Networked Control Systems: An Introduction to the Issue , 2015 .
[75] Tao Tang,et al. A Cognitive Control Approach to Communication-Based Train Control Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.
[76] Pieter Abbeel,et al. Image Object Label 3 D CAD Model Candidate Grasps Google Object Recognition Engine Google Cloud Storage Select Feasible Grasp with Highest Success Probability Pose EstimationCamera Robots Cloud 3 D Sensor , 2014 .
[77] Tomohisa Hayakawa,et al. Event-Triggered Output Feedback Control Resilient Against Jamming Attacks and Random Packet Losses , 2015 .
[78] Mark A. Ganter,et al. Low-cost closed-loop control of a 3D printer gantry , 2015 .
[79] Todd R. Andel,et al. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.
[80] Alexander J. Smola,et al. Communication Efficient Distributed Machine Learning with the Parameter Server , 2014, NIPS.
[81] Ling Shi,et al. Multi-sensor transmission power scheduling for remote state estimation under SINR model , 2014, 53rd IEEE Conference on Decision and Control.
[82] Quanyan Zhu,et al. A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.
[83] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[84] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[85] L. Sturm,et al. CYBER-PHYSICAL VUNERABILITIES IN ADDITIVE MANUFACTURING SYSTEMS , 2014 .
[86] Rob Sloan,et al. Advanced Persistent Threat , 2014 .
[87] Moritz Diehl,et al. Model Predictive Control of Autonomous Vehicles , 2014 .
[88] M Maarten Steinbuch,et al. Optimization and optimal control in automotive systems , 2014 .
[89] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[90] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[91] Quanyan Zhu,et al. A hierarchical multi-agent dynamical system architecture for resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[92] Tingwen Huang,et al. Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.
[93] Karl Henrik Johansson,et al. Event-triggered model predictive control of discrete-time linear systems subject to disturbances , 2013, 2013 European Control Conference (ECC).
[94] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[95] David Mascareñas,et al. A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.
[96] Russell Bent,et al. Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems , 2013, IEEE Transactions on Smart Grid.
[97] Louis Turnbull,et al. Cloud robotics: Formation control of a multi robot system utilizing cloud infrastructure , 2013, 2013 Proceedings of IEEE Southeastcon.
[98] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[99] Quanyan Zhu,et al. Dynamic Service Placement in Geographically Distributed Clouds , 2012, IEEE Journal on Selected Areas in Communications.
[100] Quanyan Zhu,et al. Networked cyber-physical systems: Interdependence, resilience and information exchange , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[101] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[102] Pankaj Singh,et al. Cloud Computing for Agent-Based Urban Transportation Systems , 2013 .
[103] Guy Shani,et al. Noname manuscript No. (will be inserted by the editor) A Survey of Point-Based POMDP Solvers , 2022 .
[104] Abdelhamid Mellouk,et al. ITS-cloud: Cloud computing for Intelligent transportation system , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[105] Quanyan Zhu,et al. Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[106] Paulo Tabuada,et al. An introduction to event-triggered and self-triggered control , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[107] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[108] Quanyan Zhu,et al. Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks , 2012, IEEE Journal on Selected Areas in Communications.
[109] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[110] Quanyan Zhu,et al. Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies , 2012, 2012 5th International Symposium on Resilient Control Systems.
[111] Mehdi Kargahi,et al. A Method for Improving Delay-Sensitive Accuracy in Real-Time Embedded Systems , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.
[112] Sehyun Park,et al. Cloud Computing-Based Building Energy Management System with ZigBee Sensor Network , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[113] Mo-Yuen Chow,et al. Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms , 2012, IEEE Transactions on Industrial Electronics.
[114] Matt Ratto,et al. Materializing information: 3D printing and social change , 2012, First Monday.
[115] Istvan Papp,et al. Gateway device for energy-saving cloud-enabled smart homes , 2012, 2012 Proceedings of the 35th International Convention MIPRO.
[116] Guoqiang Hu,et al. Cloud robotics: architecture, challenges and applications , 2012, IEEE Network.
[117] Dmitry Berenson,et al. Toward cloud-based grasping with uncertainty in shape: Estimating lower bounds on achieving force closure with zero-slip push grasps , 2012, 2012 IEEE International Conference on Robotics and Automation.
[118] Quanyan Zhu,et al. A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.
[119] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[120] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[121] Tao Tang,et al. Cross-Layer Handoff Design in MIMO-Enabled WLANs for Communication-Based Train Control (CBTC) Systems , 2012, IEEE Journal on Selected Areas in Communications.
[122] Xun Xu,et al. From cloud computing to cloud manufacturing , 2012 .
[123] Muhammad Mohsin Nazir,et al. Handling Security Issues for Smart Grid Applications using Cloud Computing Framework , 2012 .
[124] Andrew W Evans,et al. Fatal train accidents on Europe's railways: 1980-2009. , 2014, Accident; analysis and prevention.
[125] Young-Jin Kim,et al. Cloud-based demand response for smart grid: Architecture and distributed algorithms , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[126] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[127] Marília Curado,et al. Towards Energy Consumption Measurement in a Cloud Computing Wireless Testbed , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.
[128] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[129] Alexandre M. Bayen,et al. Scaling the mobile millennium system in the cloud , 2011, SoCC.
[130] Anthony Lai,et al. Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[131] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[132] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[133] Yuanjie Li,et al. Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..
[134] Fei Tao,et al. Cloud manufacturing: a computing and service-oriented manufacturing model , 2011 .
[135] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[136] Tong Heng Lee,et al. Design and implementation of a robust and nonlinear flight control system for an unmanned helicopter , 2011 .
[137] Yogesh L. Simmhan,et al. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[138] E. Steyerberg,et al. [Regression modeling strategies]. , 2011, Revista espanola de cardiologia.
[139] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[140] Husheng Li,et al. A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[141] Yogesh L. Simmhan,et al. An Informatics Approach to Demand Response Optimization in Smart Grids , 2011 .
[142] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[143] Ehab Al-Shaer,et al. Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.
[144] Goran Andersson,et al. Model Predictive Control of Energy Storage including Uncertain Forecasts , 2011 .
[145] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[146] Quanyan Zhu,et al. Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.
[147] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.
[148] Xiaojun Wu,et al. DAvinCi: A cloud computing framework for service robots , 2010, 2010 IEEE International Conference on Robotics and Automation.
[149] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[150] Georgios B. Giannakis,et al. Consensus-Based Distributed Support Vector Machines , 2010, J. Mach. Learn. Res..
[151] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[152] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[153] David I. Gertman,et al. Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.
[154] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[155] Dr. Clifford Neuman. Challenges in Security for Cyber-Physical Systems , 2009 .
[156] Stephen J. Wright,et al. Distributed MPC Strategies With Application to Power System Automatic Generation Control , 2008, IEEE Transactions on Control Systems Technology.
[157] Rachid El Azouzi,et al. Constrained Stochastic Games in Wireless Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[158] Dimitrios Hristu-Varsakelis,et al. Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols , 2007, ICETE.
[159] Anthony Ephremides,et al. A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[160] Matthias Scheutz,et al. Development environments for autonomous mobile robots: A survey , 2007, Auton. Robots.
[161] Pascal Poupart,et al. Point-Based Value Iteration for Continuous POMDPs , 2006, J. Mach. Learn. Res..
[162] Zhaohui Wu,et al. Intelligent Transportation Systems , 2006, IEEE Pervasive Computing.
[163] Tamer Basar,et al. Optimal control of LTI systems over unreliable communication links , 2006, Autom..
[164] R. P. Marques,et al. Discrete-Time Markov Jump Linear Systems , 2004, IEEE Transactions on Automatic Control.
[165] Vitaly Shmatikov,et al. Game-based analysis of denial-of-service prevention protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[166] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[167] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[168] P.V. Craven,et al. A brief look at railroad communication vulnerabilities , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).
[169] Sekhar Tatikonda,et al. Control under communication constraints , 2004, IEEE Transactions on Automatic Control.
[170] Tianmiao Wang,et al. Remote surgery case: robot-assisted teleneurosurgery , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.
[171] Claudio De Persis,et al. Input-to-state stabilizing MPC for neutrally stable linear systems subject to input constraints , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[172] Peter J Seiler,et al. Analysis of communication losses in vehicle control problems , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).
[173] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[174] David Q. Mayne,et al. Constrained model predictive control: Stability and optimality , 2000, Autom..
[175] P. Poupart. Approximate value-directed belief state monitoring for partially observable Markov decision processes , 2000 .
[176] Hisham Abou-Kandil,et al. On the solution of discrete-time Markovian jump linear quadratic control problems , 1995, Autom..
[177] M. A. Abdelrazik,et al. The E-SAT 300A: a multichannel satellite communication system for aircraft , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.
[178] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[179] J. Doyle,et al. Linear control theory with an H ∞ 0E optimality criterion , 1987 .
[180] Edward J. Sondik,et al. The Optimal Control of Partially Observable Markov Processes over the Infinite Horizon: Discounted Costs , 1978, Oper. Res..
[181] R. K. Mehra,et al. Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .
[182] Edward J. Sondik,et al. The optimal control of par-tially observable Markov processes , 1971 .
[183] J. Harsanyi. Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .