Cyber security automation for controlling distributed data
暂无分享,去创建一个
[1] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[2] Zhu Han,et al. Detection of false data injection in power grid exploiting low rank and sparsity , 2013, 2013 IEEE International Conference on Communications (ICC).
[3] Gabor Karsai,et al. A testbed for secure and robust SCADA systems , 2008, SIGBED.
[4] James M. Keller,et al. A fuzzy K-nearest neighbor algorithm , 1985, IEEE Transactions on Systems, Man, and Cybernetics.
[5] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[6] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[7] John Wroclawski,et al. Current Developments in DETER Cybersecurity Testbed Technology , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[8] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[9] Vir V. Phoha,et al. Cyber-physical Systems Security , 2014 .
[10] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[11] Fan Yu Tao,et al. Design of Two-Way One-Time-Password Authentication Scheme Based on True Random Numbers , 2009, 2009 Second International Workshop on Computer Science and Engineering.
[12] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.