Safety-critical cyber-physical attacks: analysis, detection, and mitigation
暂无分享,去创建一个
Ravishankar K. Iyer | Zbigniew T. Kalbarczyk | Daniel Chen | Hui Lin | Homa Alemzadeh | Z. Kalbarczyk | H. Alemzadeh | Daniel Chen | Hui Lin | R. Iyer
[1] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[2] Haibo He,et al. Resilience Analysis of Power Grids Under the Sequential Attack , 2014, IEEE Transactions on Information Forensics and Security.
[3] Haibo He,et al. Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .
[4] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[5] David K. Y. Yau,et al. Optimal False Data Injection Attack against Automatic Generation Control in Power Grids , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[6] Ravishankar K. Iyer,et al. Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol , 2013, CSIIRW '13.
[7] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[8] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[9] I. Dobson,et al. Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.
[10] Carl A. Gunter,et al. Cumulative Attestation Kernels for Embedded Systems , 2009, IEEE Transactions on Smart Grid.
[11] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[12] Blake Hannaford,et al. Raven-II: An Open Platform for Surgical Robotics Research , 2013, IEEE Transactions on Biomedical Engineering.
[13] Sandip Roy,et al. Power System Extreme Event Detection: The Vulnerability Frontier , 2007, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[14] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[15] Blake Hannaford,et al. Plugfest 2009: Global interoperability in Telerobotics and telemedicine , 2010, 2010 IEEE International Conference on Robotics and Automation.
[16] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[17] Blake Hannaford,et al. The RAVEN: Design and Validation of a Telesurgery System , 2009, Int. J. Robotics Res..
[18] A. Bose,et al. Reactive Power Considerations in Automatic Contingency Selection , 1982, IEEE Transactions on Power Apparatus and Systems.
[19] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[20] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[21] Ravishankar K. Iyer,et al. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.
[22] P. Hines,et al. Do topological models provide good information about electricity infrastructure vulnerability? , 2010, Chaos.
[23] Thenkurussi Kesavadas,et al. Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[24] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.