Secure Estimation in the Presence of Integrity Attacks
暂无分享,去创建一个
[1] F. Hampel. A General Qualitative Definition of Robustness , 1971 .
[2] F. Hampel. The Influence Curve and Its Role in Robust Estimation , 1974 .
[3] S.A. Kassam,et al. Robust techniques for signal processing: A survey , 1985, Proceedings of the IEEE.
[4] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[5] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[6] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[7] V. Yohai,et al. Robust Statistics: Theory and Methods , 2006 .
[8] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[9] T. M. Chen,et al. Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..
[10] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[11] David P. Fidler,et al. Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.
[12] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[13] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[14] Bruno Sinopoli,et al. Robust estimation in the presence of integrity attacks , 2013, 52nd IEEE Conference on Decision and Control.
[15] João P. Hespanha,et al. Resilient Detection in the Presence of Integrity Attacks , 2014, IEEE Transactions on Signal Processing.
[16] Mi-Ching Tsai,et al. Robust and Optimal Control , 2014 .