Constraining Attackers and Enabling Operators via Actuation Limits
暂无分享,去创建一个
[1] Claire J. Tomlin,et al. Design of guaranteed safe maneuvers using reachable sets: Autonomous quadrotor aerobatics in theory and practice , 2010, 2010 IEEE International Conference on Robotics and Automation.
[2] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[3] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[4] F. L. Chernousko,et al. Ellipsoidal state estimation for dynamical systems , 2005 .
[5] E. Yaz. Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.
[6] John Lygeros,et al. Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems , 2008, Autom..
[7] Phan Thanh Nam,et al. Reachable Set Bounding for Linear Discrete-Time Systems with Delays and Bounded Disturbances , 2013, J. Optim. Theory Appl..
[8] Pravin Varaiya,et al. Ellipsoidal Techniques for Reachability Analysis of Discrete-Time Linear Systems , 2007, IEEE Transactions on Automatic Control.
[9] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[10] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[11] A. Girard,et al. Reachability analysis of linear systems using support functions , 2010 .
[12] Jairo Giraldo,et al. Constraining Attacker Capabilities Through Actuator Saturation , 2017, 2018 Annual American Control Conference (ACC).
[13] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[14] Navid Hashemi,et al. A Comparison of Stealthy Sensor Attacks on Control Systems , 2017, 2018 Annual American Control Conference (ACC).