Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach

[1]  Britta Hale,et al.  Secure Messaging Authentication against Active Man-in-the-Middle Attacks , 2021, 2021 IEEE European Symposium on Security and Privacy (EuroS&P).

[2]  Quanyan Zhu,et al.  Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach , 2020 .

[3]  A. Kott,et al.  Modeling and Design of Secure Internet of Things , 2020 .

[4]  Arvind Easwaran,et al.  A Game-Theoretic Approach to Secure Estimation and Control for Cyber-Physical Systems with a Digital Twin , 2020, 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS).

[5]  Quanyan Zhu Control Challenges for Resilient Control Systems , 2020, ArXiv.

[6]  Quanyan Zhu,et al.  Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2020, IEEE Transactions on Control of Network Systems.

[7]  Quanyan Zhu,et al.  A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..

[8]  Tao Zhang,et al.  Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation , 2019, ArXiv.

[9]  Xianbin Wang,et al.  Toward Massive Machine Type Communications in Ultra-Dense Cellular IoT Networks: Current Issues and Machine Learning-Assisted Solutions , 2018, IEEE Communications Surveys & Tutorials.

[10]  Dynamic Games of Asymmetric Information for Deceptive Autonomous Vehicles. , 2019, 1907.00459.

[11]  Tianjian Chen,et al.  Federated Machine Learning: Concept and Applications , 2019 .

[12]  Quanyan Zhu,et al.  Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Quanyan Zhu,et al.  Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.

[14]  Quanyan Zhu,et al.  Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.

[15]  Yongli Wei,et al.  Digital twin for CNC machine tool: modeling and using strategy , 2018, J. Ambient Intell. Humaniz. Comput..

[16]  Quanyan Zhu,et al.  iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.

[17]  Quanyan Zhu,et al.  Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.

[18]  Quanyan Zhu,et al.  A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..

[19]  Industrial Control Systems Security and Resiliency: Practice and Theory , 2019, Advances in Information Security.

[20]  M. Pirani,et al.  A systems and control perspective of CPS security , 2019, Annu. Rev. Control..

[21]  Quanyan Zhu,et al.  Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.

[22]  Claire J. Tomlin,et al.  Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..

[23]  Prithviraj Dasgupta,et al.  A Comprehensive Survey of Recent Trends in Cloud Robotics Architectures and Applications , 2018, Robotics.

[24]  Quanyan Zhu,et al.  Performance of Dynamic Secure Routing Game , 2018, Game Theory for Networking Applications.

[25]  Quanyan Zhu,et al.  Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).

[26]  Marco Caccamo,et al.  Guaranteed Physical Security with Restart-Based Design for Cyber-Physical Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).

[27]  Quanyan Zhu,et al.  On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.

[28]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[29]  Quanyan Zhu,et al.  Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[30]  Fei Tao,et al.  Digital twin-driven product design, manufacturing and service with big data , 2017, The International Journal of Advanced Manufacturing Technology.

[31]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[32]  Quanyan Zhu,et al.  Consensus-based transfer linear support vector machines for decentralized multi-task multi-agent learning , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).

[33]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[34]  D. Rajan Probability, Random Variables, and Stochastic Processes , 2017 .

[35]  Quanyan Zhu,et al.  A game-theoretic defense against data poisoning attacks in distributed support vector machines , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[36]  Branislav Bosanský,et al.  Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.

[37]  Quanyan Zhu,et al.  Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles , 2017, GameSec.

[38]  Quanyan Zhu,et al.  Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.

[39]  Quanyan Zhu,et al.  Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games , 2017, GameSec.

[40]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[41]  Quanyan Zhu,et al.  Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[42]  Quanyan Zhu,et al.  Optimizing mission critical data dissemination in massive IoT networks , 2017, 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[43]  Quanyan Zhu,et al.  Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.

[44]  Rui Zhang,et al.  A game-theoretic analysis of label flipping attacks on distributed support vector machines , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[45]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[46]  Branislav Bosanský,et al.  Heuristic Search Value Iteration for One-Sided Partially Observable Stochastic Games , 2017, AAAI.

[47]  Hemraj Saini,et al.  A recent review on lightweight cryptography in IoT , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[48]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[49]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.

[50]  Quanyan Zhu,et al.  A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars , 2016, GameSec.

[51]  Peter Schartner,et al.  Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).

[52]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[53]  Quanyan Zhu,et al.  Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).

[54]  Quanyan Zhu,et al.  Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).

[55]  J. O’Kane A Gentle Introduction to ROS , 2016 .

[56]  Takahiro Fujita,et al.  Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[57]  Miriam A. M. Capretz,et al.  MLaaS: Machine Learning as a Service , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[58]  Quanyan Zhu,et al.  Environment-aware power generation scheduling in smart grids , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[59]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[60]  Quanyan Zhu,et al.  Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games , 2015, MIST@CCS.

[61]  Marina Aguado,et al.  Cyber security analysis of the European train control system , 2015, IEEE Communications Magazine.

[62]  José Manuel Riera,et al.  A survey on future railway radio communications services: challenges and opportunities , 2015, IEEE Communications Magazine.

[63]  Darren J. Hartl,et al.  Computationally Efficient Analysis of SMA Sensory Particles Embedded in Complex Aerostructures Using a Substructure Approach , 2015 .

[64]  Tingwen Huang,et al.  Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.

[65]  Zhi Chen,et al.  A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..

[66]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[67]  Rui Zhang,et al.  Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[68]  Quanyan Zhu,et al.  Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.

[69]  Dario Pompili,et al.  Dynamic Collaboration Between Networked Robots and Clouds in Resource-Constrained Environments , 2015, IEEE Transactions on Automation Science and Engineering.

[70]  Quanyan Zhu,et al.  A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[71]  Moritz Tenorth,et al.  RoboEarth Semantic Mapping: A Cloud Enabled Knowledge-Based Approach , 2015, IEEE Transactions on Automation Science and Engineering.

[72]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[73]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[74]  Karl Henrik Johansson,et al.  Cyberphysical Security in Networked Control Systems: An Introduction to the Issue , 2015 .

[75]  Tao Tang,et al.  A Cognitive Control Approach to Communication-Based Train Control Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.

[76]  Pieter Abbeel,et al.  Image Object Label 3 D CAD Model Candidate Grasps Google Object Recognition Engine Google Cloud Storage Select Feasible Grasp with Highest Success Probability Pose EstimationCamera Robots Cloud 3 D Sensor , 2014 .

[77]  Tomohisa Hayakawa,et al.  Event-Triggered Output Feedback Control Resilient Against Jamming Attacks and Random Packet Losses , 2015 .

[78]  Mark A. Ganter,et al.  Low-cost closed-loop control of a 3D printer gantry , 2015 .

[79]  Todd R. Andel,et al.  Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing , 2014, PPREW@ACSAC.

[80]  Alexander J. Smola,et al.  Communication Efficient Distributed Machine Learning with the Parameter Server , 2014, NIPS.

[81]  Ling Shi,et al.  Multi-sensor transmission power scheduling for remote state estimation under SINR model , 2014, 53rd IEEE Conference on Decision and Control.

[82]  Quanyan Zhu,et al.  A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.

[83]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[84]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[85]  L. Sturm,et al.  CYBER-PHYSICAL VUNERABILITIES IN ADDITIVE MANUFACTURING SYSTEMS , 2014 .

[86]  Rob Sloan,et al.  Advanced Persistent Threat , 2014 .

[87]  Moritz Diehl,et al.  Model Predictive Control of Autonomous Vehicles , 2014 .

[88]  M Maarten Steinbuch,et al.  Optimization and optimal control in automotive systems , 2014 .

[89]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[90]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[91]  Quanyan Zhu,et al.  A hierarchical multi-agent dynamical system architecture for resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[92]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.

[93]  Karl Henrik Johansson,et al.  Event-triggered model predictive control of discrete-time linear systems subject to disturbances , 2013, 2013 European Control Conference (ECC).

[94]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[95]  David Mascareñas,et al.  A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.

[96]  Russell Bent,et al.  Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems , 2013, IEEE Transactions on Smart Grid.

[97]  Louis Turnbull,et al.  Cloud robotics: Formation control of a multi robot system utilizing cloud infrastructure , 2013, 2013 Proceedings of IEEE Southeastcon.

[98]  Adriano Valenzano,et al.  Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.

[99]  Quanyan Zhu,et al.  Dynamic Service Placement in Geographically Distributed Clouds , 2012, IEEE Journal on Selected Areas in Communications.

[100]  Quanyan Zhu,et al.  Networked cyber-physical systems: Interdependence, resilience and information exchange , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[101]  Mauro Barni,et al.  Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.

[102]  Pankaj Singh,et al.  Cloud Computing for Agent-Based Urban Transportation Systems , 2013 .

[103]  Guy Shani,et al.  A survey of point-based POMDP solvers , 2013, Autonomous Agents and Multi-Agent Systems.

[104]  Abdelhamid Mellouk,et al.  ITS-cloud: Cloud computing for Intelligent transportation system , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[105]  Quanyan Zhu,et al.  Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[106]  Paulo Tabuada,et al.  An introduction to event-triggered and self-triggered control , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[107]  Ronald L. Rivest,et al.  FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.

[108]  Quanyan Zhu,et al.  Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks , 2012, IEEE Journal on Selected Areas in Communications.

[109]  Dale C. Rowe,et al.  A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.

[110]  Quanyan Zhu,et al.  Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies , 2012, 2012 5th International Symposium on Resilient Control Systems.

[111]  Mehdi Kargahi,et al.  A Method for Improving Delay-Sensitive Accuracy in Real-Time Embedded Systems , 2012, 2012 IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.

[112]  Sehyun Park,et al.  Cloud Computing-Based Building Energy Management System with ZigBee Sensor Network , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[113]  Mo-Yuen Chow,et al.  Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms , 2012, IEEE Transactions on Industrial Electronics.

[114]  Matt Ratto,et al.  Materializing information: 3D printing and social change , 2012, First Monday.

[115]  Istvan Papp,et al.  Gateway device for energy-saving cloud-enabled smart homes , 2012, 2012 Proceedings of the 35th International Convention MIPRO.

[116]  Guoqiang Hu,et al.  Cloud robotics: architecture, challenges and applications , 2012, IEEE Network.

[117]  Dmitry Berenson,et al.  Toward cloud-based grasping with uncertainty in shape: Estimating lower bounds on achieving force closure with zero-slip push grasps , 2012, 2012 IEEE International Conference on Robotics and Automation.

[118]  Quanyan Zhu,et al.  A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.

[119]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[120]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[121]  Tao Tang,et al.  Cross-Layer Handoff Design in MIMO-Enabled WLANs for Communication-Based Train Control (CBTC) Systems , 2012, IEEE Journal on Selected Areas in Communications.

[122]  Xun Xu,et al.  From cloud computing to cloud manufacturing , 2012 .

[123]  Muhammad Mohsin Nazir,et al.  Handling Security Issues for Smart Grid Applications using Cloud Computing Framework , 2012 .

[124]  Andrew W Evans,et al.  Fatal train accidents on Europe's railways: 1980-2009. , 2014, Accident; analysis and prevention.

[125]  Young-Jin Kim,et al.  Cloud-based demand response for smart grid: Architecture and distributed algorithms , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[126]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[127]  Marília Curado,et al.  Towards Energy Consumption Measurement in a Cloud Computing Wireless Testbed , 2011, 2011 First International Symposium on Network Cloud Computing and Applications.

[128]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[129]  Alexandre M. Bayen,et al.  Scaling the mobile millennium system in the cloud , 2011, SoCC.

[130]  Anthony Lai,et al.  Evidence of Advanced Persistent Threat: A case study of malware for political espionage , 2011, 2011 6th International Conference on Malicious and Unwanted Software.

[131]  Sushil Jajodia,et al.  Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.

[132]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[133]  Yuanjie Li,et al.  Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..

[134]  Fei Tao,et al.  Cloud manufacturing: a computing and service-oriented manufacturing model , 2011 .

[135]  Colin Tankard,et al.  Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..

[136]  Tong Heng Lee,et al.  Design and implementation of a robust and nonlinear flight control system for an unmanned helicopter , 2011 .

[137]  Yogesh L. Simmhan,et al.  An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[138]  E. Steyerberg,et al.  [Regression modeling strategies]. , 2011, Revista espanola de cardiologia.

[139]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[140]  Husheng Li,et al.  A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[141]  Yogesh L. Simmhan,et al.  An Informatics Approach to Demand Response Optimization in Smart Grids , 2011 .

[142]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[143]  Ehab Al-Shaer Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.

[144]  Goran Andersson,et al.  Model Predictive Control of Energy Storage including Uncertain Forecasts , 2011 .

[145]  Yong Tang,et al.  Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[146]  Quanyan Zhu,et al.  Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.

[147]  Quanyan Zhu,et al.  A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.

[148]  Xiaojun Wu,et al.  DAvinCi: A cloud computing framework for service robots , 2010, 2010 IEEE International Conference on Robotics and Automation.

[149]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[150]  Georgios B. Giannakis,et al.  Consensus-Based Distributed Support Vector Machines , 2010, J. Mach. Learn. Res..

[151]  Quanyan Zhu,et al.  Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[152]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[153]  David I. Gertman,et al.  Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.

[154]  Morgan Quigley,et al.  ROS: an open-source Robot Operating System , 2009, ICRA 2009.

[155]  Dr. Clifford Neuman Challenges in Security for Cyber-Physical Systems , 2009 .

[156]  Stephen J. Wright,et al.  Distributed MPC Strategies With Application to Power System Automatic Generation Control , 2008, IEEE Transactions on Control Systems Technology.

[157]  Rachid El Azouzi,et al.  Constrained Stochastic Games in Wireless Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[158]  Dimitrios Hristu-Varsakelis,et al.  Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols , 2007, ICETE.

[159]  Anthony Ephremides,et al.  A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.

[160]  Matthias Scheutz,et al.  Development environments for autonomous mobile robots: A survey , 2007, Auton. Robots.

[161]  Pascal Poupart,et al.  Point-Based Value Iteration for Continuous POMDPs , 2006, J. Mach. Learn. Res..

[162]  Zhaohui Wu,et al.  Intelligent Transportation Systems , 2006, IEEE Pervasive Computing.

[163]  Tamer Basar,et al.  Optimal control of LTI systems over unreliable communication links , 2006, Autom..

[164]  R. P. Marques,et al.  Discrete-Time Markov Jump Linear Systems , 2004, IEEE Transactions on Automatic Control.

[165]  Vitaly Shmatikov,et al.  Game-based analysis of denial-of-service prevention protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[166]  John C. Harsanyi,et al.  Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..

[167]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[168]  P.V. Craven,et al.  A brief look at railroad communication vulnerabilities , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).

[169]  Sekhar Tatikonda,et al.  Control under communication constraints , 2004, IEEE Transactions on Automatic Control.

[170]  Tianmiao Wang,et al.  Remote surgery case: robot-assisted teleneurosurgery , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[171]  Claudio De Persis,et al.  Input-to-state stabilizing MPC for neutrally stable linear systems subject to input constraints , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[172]  Peter J Seiler,et al.  Analysis of communication losses in vehicle control problems , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).

[173]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[174]  David Q. Mayne,et al.  Constrained model predictive control: Stability and optimality , 2000, Autom..

[175]  P. Poupart Approximate value-directed belief state monitoring for partially observable Markov decision processes , 2000 .

[176]  Hisham Abou-Kandil,et al.  On the solution of discrete-time Markovian jump linear quadratic control problems , 1995, Autom..

[177]  M. A. Abdelrazik,et al.  The E-SAT 300A: a multichannel satellite communication system for aircraft , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[178]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[179]  J. Doyle,et al.  Linear control theory with an H ∞ 0E optimality criterion , 1987 .

[180]  Edward J. Sondik,et al.  The Optimal Control of Partially Observable Markov Processes over the Infinite Horizon: Discounted Costs , 1978, Oper. Res..

[181]  R. K. Mehra,et al.  Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .

[182]  Edward J. Sondik,et al.  The optimal control of par-tially observable Markov processes , 1971 .

[183]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .