Cyber physical attacks constrained by control objectives
暂无分享,去创建一个
[1] Soummya Kar,et al. Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[2] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[4] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[5] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[6] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[7] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[8] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[9] K. J. Burnham,et al. 4-dimensional control of a remotely piloted vehicle , 1996 .
[10] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[11] Jason L. Speyer,et al. Stochastic Processes, Estimation, and Control , 2008, Advances in design and control.
[12] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[13] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[14] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[15] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[16] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[17] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.