Constraining Attacker Capabilities Through Actuator Saturation
暂无分享,去创建一个
Jairo Giraldo | Alvaro A. Cárdenas | Carlos Murguia | Justin Ruths | Sahand Hadizadeh Kafash | A. Cárdenas | Justin Ruths | C. Murguia | J. Giraldo
[1] Vijay Gupta,et al. On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.
[2] Carlos Murguia,et al. Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.
[3] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[4] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[5] E. Yaz. Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.
[6] Nathan van de Wouw,et al. Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .
[7] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[8] Michail Maniatakos,et al. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.
[9] J. Hedrick,et al. String stability of interconnected systems , 1995, Proceedings of 1995 American Control Conference - ACC'95.
[10] Nathan van de Wouw,et al. Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability , 2014, IEEE Transactions on Intelligent Transportation Systems.
[11] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[12] Zhili Sun,et al. Applications of vehicular communications for reducing fuel consumption and CO2 emission: the state of the art and research challenges , 2012, IEEE Communications Magazine.
[13] Martín Ochoa,et al. Design-time Quantification of Integrity in Cyber-physical Systems , 2017, PLAS@CCS.
[14] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[15] Stephen P. Boyd,et al. Linear Matrix Inequalities in Systems and Control Theory , 1994 .
[16] Carlos Murguia,et al. CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).
[17] Quanyan Zhu,et al. Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.
[18] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[19] Sophie Tarbouriech,et al. Stability and Stabilization of Linear Systems with Saturating Actuators , 2011 .
[20] Karl Johan Åström,et al. Computer-controlled systems (3rd ed.) , 1997 .
[21] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[22] Nathan van de Wouw,et al. Controller Synthesis for String Stability of Vehicle Platoons , 2014, IEEE Transactions on Intelligent Transportation Systems.
[23] J. Lofberg,et al. YALMIP : a toolbox for modeling and optimization in MATLAB , 2004, 2004 IEEE International Conference on Robotics and Automation (IEEE Cat. No.04CH37508).
[24] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[25] Soodeh Dadras,et al. Vehicular Platooning in an Adversarial Environment , 2015, AsiaCCS.
[26] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[27] Phan Thanh Nam,et al. Reachable Set Bounding for Linear Discrete-Time Systems with Delays and Bounded Disturbances , 2013, J. Optim. Theory Appl..
[28] Ahmad-Reza Sadeghi,et al. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security , 2017, AsiaCCS.