A survey on security control and attack detection for industrial cyber-physical systems
暂无分享,去创建一个
Yang Xiang | Qing-Long Han | Xiaohua Ge | Derui Ding | Xian-Ming Zhang | Derui Ding | Q. Han | Xianming Zhang | Xiaohua Ge | Yang Xiang
[1] Tingwen Huang,et al. Stabilization for sampled-data systems under noisy sampling interval , 2016, Autom..
[2] Michael D. Lemmon,et al. Distributed Switching Control to Achieve Almost Sure Safety for Leader-Follower Vehicular Networked Systems , 2015, IEEE Transactions on Automatic Control.
[3] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[4] Taekyoung Kwon,et al. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.
[5] Dong Yue,et al. To Transmit or Not to Transmit: A Discrete Event-Triggered Communication Scheme for Networked Takagi–Sugeno Fuzzy Systems , 2013, IEEE Transactions on Fuzzy Systems.
[6] Long Zhao,et al. Job Scheduling With Uncertain Local Generation in Smart Buildings: Two-Stage Robust Approach , 2014, IEEE Transactions on Smart Grid.
[7] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[8] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[9] Anjan Bose,et al. Decentralized Communication and Control Systems for Power System Operation , 2015, IEEE Transactions on Smart Grid.
[10] YangQuan Chen,et al. Cyber-physical systems as general distributed parameter systems: three types of fractional order models and emerging research opportunities , 2015, IEEE/CAA Journal of Automatica Sinica.
[11] Zhong-Hua Pang,et al. Secure Networked Control Systems under Denial of Service Attacks , 2011 .
[12] Changyin Sun,et al. An Event-Triggered Approach for Load Frequency Control With Supplementary ADP , 2017, IEEE Transactions on Power Systems.
[13] Nirwan Ansari,et al. Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.
[14] Qing-Long Han,et al. A Decentralized Event-Triggered Dissipative Control Scheme for Systems With Multiple Sensors to Sample the System Outputs , 2016, IEEE Transactions on Cybernetics.
[15] Zidong Wang,et al. Distributed H∞ state estimation with stochastic parameters and nonlinearities through sensor networks: The finite-horizon case , 2012, Autom..
[16] Qing-Long Han,et al. Event-triggered dynamic output feedback control for networked control systems , 2014 .
[17] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling in Cyber-Physical Systems ∗ , 2015 .
[18] Cesare Alippi,et al. Model-Free Fault Detection and Isolation in Large-Scale Cyber-Physical Systems , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.
[19] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[20] Ling Shi,et al. Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.
[21] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[22] Qing-Long Han,et al. Achieving Cluster Formation of Multi-Agent Systems Under Aperiodic Sampling and Communication Delays , 2018, IEEE Transactions on Industrial Electronics.
[23] Frank L. Lewis,et al. Distributed Control Systems for Small-Scale Power Networks: Using Multiagent Cooperative Control Theory , 2014, IEEE Control Systems.
[24] Deepa Kundur,et al. A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.
[25] Qing-Long Han,et al. Event-Based Set-Membership Leader-Following Consensus of Networked Multi-Agent Systems Subject to Limited Communication Resources and Unknown-But-Bounded Noise , 2017, IEEE Transactions on Industrial Electronics.
[26] Qing-Long Han,et al. New stability criteria for linear systems with interval time-varying delay , 2008, Autom..
[27] Bo Tang,et al. Detection of false data injection attacks in smart grid under colored Gaussian noise , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[28] Yan Song,et al. Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks , 2016, Int. J. Gen. Syst..
[29] Zidong Wang,et al. H∞H∞ consensus control for multi-agent systems with missing measurements: The finite-horizon case , 2013, Syst. Control. Lett..
[30] Romain Postoyan,et al. A Lyapunov Redesign of Coordination Algorithms for Cyber-Physical Systems , 2014, IEEE Transactions on Automatic Control.
[31] Holger Boche,et al. Bayesian Mechanisms and Detection Methods for Wireless Network with Malicious Users , 2016, IEEE Transactions on Mobile Computing.
[32] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[33] Rongxing Lu,et al. Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.
[34] Fuad E. Alsaadi,et al. Recent advances on filtering and control for cyber-physical systems under security and resource constraints , 2016, J. Frankl. Inst..
[35] Takashi Hikihara,et al. A Hybrid System Approach to the Analysis and Design of Power Grid Dynamic Performance , 2012, Proceedings of the IEEE.
[36] Qing-Long Han,et al. A Novel Event-Triggered Transmission Scheme and ${\cal L}_{2}$ Control Co-Design for Sampled-Data Control Systems , 2013, IEEE Transactions on Automatic Control.
[37] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[38] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[39] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[40] György Dán,et al. Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.
[41] Francesco Bullo,et al. Synchronization and power sharing for droop-controlled inverters in islanded microgrids , 2012, Autom..
[42] Qing-Long Han,et al. Network-based output tracking control for T-S fuzzy systems using an event-triggered communication scheme , 2015, Fuzzy Sets Syst..
[43] Qing-Long Han,et al. Distributed Formation Control of Networked Multi-Agent Systems Using a Dynamic Event-Triggered Communication Mechanism , 2017, IEEE Transactions on Industrial Electronics.
[44] James Lam,et al. Quasi-synchronization of heterogeneous dynamic networks via distributed impulsive control: Error estimation, optimization and design , 2015, Autom..
[45] Huijun Gao,et al. Event-Triggered State Estimation for Complex Networks With Mixed Time Delays via Sampled Data Information: The Continuous-Time Case , 2015, IEEE Transactions on Cybernetics.
[46] Fumin Zhang,et al. Task Scheduling for Control Oriented Requirements for Cyber-Physical Systems , 2008, 2008 Real-Time Systems Symposium.
[47] Jun Hu,et al. Estimation, filtering and fusion for networked systems with network-induced phenomena: New progress and prospects , 2016, Inf. Fusion.
[48] Peter Willett,et al. Bayesian Data Fusion for Distributed Target Detection in Sensor Networks , 2010, IEEE Transactions on Signal Processing.
[49] Qing-Long Han,et al. On Designing a Novel Self-Triggered Sampling Scheme for Networked Control Systems With Data Losses and Communication Delays , 2016, IEEE Transactions on Industrial Electronics.
[50] Seddik Bacha,et al. Design of Robust Distributed Control for Interconnected Microgrids , 2016, IEEE Transactions on Smart Grid.
[51] David Ward,et al. Vulnerable links and secure architectures in the stabilization of networks of controlled dynamical systems , 2012, 2012 American Control Conference (ACC).
[52] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[53] Derui Ding,et al. Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability , 2015, Autom..
[54] Ling Shi,et al. A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[55] Qing-Long Han,et al. Consensus of Multiagent Systems Subject to Partially Accessible and Overlapping Markovian Network Topologies , 2017, IEEE Transactions on Cybernetics.
[56] Mo-Yuen Chow,et al. Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems , 2014, IEEE Transactions on Cybernetics.
[57] Zhihua Qu,et al. An Attack-Resilient Cooperative Control Strategy of Multiple Distributed Generators in Distribution Networks , 2016, IEEE Transactions on Smart Grid.
[58] Qing Hui,et al. Energy-Event-Triggered Hybrid Supervisory Control for Cyber-Physical Network Systems , 2015, IEEE Transactions on Automatic Control.
[59] Bing Li,et al. New stability criteria for linear systems with interval time-varying delay , 2013, Proceedings of 2013 2nd International Conference on Measurement, Information and Control.
[60] Qing-Long Han,et al. Abel lemma-based finite-sum inequality and its application to stability analysis for linear discrete time-delay systems , 2015, Autom..
[61] Jin Wang,et al. Stability analysis and controller design of DC microgrids with constant power loads , 2015, 2015 IEEE Applied Power Electronics Conference and Exposition (APEC).
[62] Zidong Wang,et al. A Constrained Optimization Approach to Dynamic State Estimation for Power Systems Including PMU and Missing Measurements , 2013, IEEE Transactions on Control Systems Technology.
[63] Zidong Wang,et al. H∞ state estimation with fading measurements, randomly varying nonlinearities and probabilistic distributed delays , 2015 .
[64] Nand Kishor,et al. Distributed Multi-Agent System-Based Load Frequency Control for Multi-Area Power System in Smart Grid , 2017, IEEE Transactions on Industrial Electronics.
[65] Frank Vahid,et al. A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems , 2014, KSII Trans. Internet Inf. Syst..
[66] Yunghsiang Sam Han,et al. Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.
[67] H. T. Mouftah,et al. Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues , 2015, IEEE Communications Surveys & Tutorials.
[68] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[69] Fuad E. Alsaadi,et al. On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors , 2017, Neurocomputing.
[70] Huijun Gao,et al. On H-infinity Estimation of Randomly Occurring Faults for A Class of Nonlinear Time-Varying Systems With Fading Channels , 2016, IEEE Transactions on Automatic Control.
[71] Jinde Cao,et al. Leader-Following Consensus of Nonlinear Multiagent Systems With Stochastic Sampling , 2017, IEEE Transactions on Cybernetics.
[72] Panos J. Antsaklis,et al. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.
[73] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[74] Insup Lee,et al. Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.
[75] Nand Kishor,et al. Load Frequency Control with Communication Topology Changes in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.
[76] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[77] Danda B. Rawat,et al. Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.
[78] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[79] Jay Lee,et al. Smart Agents in Industrial Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[80] Zidong Wang,et al. Event-triggered distributed ℋ ∞ state estimation with packet dropouts through sensor networks , 2015 .
[81] Fuad E. Alsaadi,et al. State estimation for a class of artificial neural networks with stochastically corrupted measurements under Round-Robin protocol , 2016, Neural Networks.
[82] Derui Ding,et al. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..
[83] Qing-Long Han,et al. A New $H_{{\bm \infty}}$ Stabilization Criterion for Networked Control Systems , 2008, IEEE Transactions on Automatic Control.
[84] Qing-Long Han,et al. Delay-dependent robust stability for uncertain linear systems with interval time-varying delay , 2006, Autom..
[85] Gexiang Zhang,et al. Power System Real-Time Monitoring by Using PMU-Based Robust State Estimation Method , 2016, IEEE Transactions on Smart Grid.
[86] Donghua Zhou,et al. Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.
[87] Xinghuo Yu,et al. Survey on Recent Advances in Networked Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[88] Changyun Wen,et al. Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .
[89] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[90] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[91] Qing-Long Han,et al. An Overview and Deep Investigation on Sampled-Data-Based Event-Triggered Control and Filtering for Networked Systems , 2017, IEEE Transactions on Industrial Informatics.
[92] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[93] Maria Domenica Di Benedetto,et al. Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks , 2016, Autom..
[94] Edward A. Lee,et al. A Programming Model for Time-Synchronized Distributed Real-Time Systems , 2007, 13th IEEE Real Time and Embedded Technology and Applications Symposium (RTAS'07).
[95] Jiming Chen,et al. Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.
[96] Jia Wang,et al. Event-Triggered Generalized Dissipativity Filtering for Neural Networks With Time-Varying Delays , 2016, IEEE Transactions on Neural Networks and Learning Systems.
[97] Xinping Guan,et al. A comprehensive overview of cyber-physical systems: from perspective of feedback system , 2016, IEEE/CAA Journal of Automatica Sinica.
[98] Zhiwei Gao,et al. From Model, Signal to Knowledge: A Data-Driven Perspective of Fault Detection and Diagnosis , 2013, IEEE Transactions on Industrial Informatics.
[99] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[100] Zhu Han,et al. Data Traffic Scheduling for Cyber Physical Systems With Application in Voltage Control of Distributed Generations: A Hybrid System Framework , 2014, IEEE Systems Journal.
[101] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[102] Lei Zou,et al. Observer-based H∞ control of networked systems with stochastic communication protocol: The finite-horizon case , 2016, Autom..
[103] Fuad E. Alsaadi,et al. Receding horizon filtering for a class of discrete time-varying nonlinear systems with multiple missing measurements , 2015, Int. J. Gen. Syst..
[104] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[105] Robert J. Elliott,et al. On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[106] Qing-Long Han,et al. Security control for a class of discrete-time stochastic nonlinear systems subject to deception attacks , 2016 .
[107] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[108] Zidong Wang,et al. Variance-constrained H∞ control for a class of nonlinear stochastic discrete time-varying systems: The event-triggered design , 2016, Autom..
[109] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[110] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[111] W. P. M. H. Heemels,et al. Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.
[112] L. Nordstrom,et al. A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis , 2014, IEEE Transactions on Power Delivery.
[113] José M. F. Moura,et al. Modeling of Future Cyber–Physical Energy Systems for Distributed Sensing and Control , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[114] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[115] Nand Kishor,et al. Robust H-infinity load frequency control in hybrid distributed generation system , 2013 .
[116] Minrui Fei,et al. Decentralized event-triggered average consensus for multi-agent systems in CPSs with communication constraints , 2015, IEEE/CAA Journal of Automatica Sinica.
[117] Daniel W. C. Ho,et al. Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.
[118] Zidong Wang,et al. Event-based security control for discrete-time stochastic systems , 2016 .
[119] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[120] Xin Xu,et al. MixCPS: Mixed Time/Event-Triggered Architecture of Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[121] Mohsen Guizani,et al. Securing Cognitive Radio Networks against Primary User Emulation Attacks , 2016, IEEE Network.
[122] Saurabh Amin,et al. In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.
[123] William H. Sanders,et al. SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.
[124] Jing Lin,et al. Modeling Cyber-Physical Systems with Semantic Agents , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[125] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[126] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[127] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[128] Qing-Long Han,et al. An improved reciprocally convex inequality and an augmented Lyapunov-Krasovskii functional for stability of linear systems with time-varying delay , 2017, Autom..
[129] Qing-Long Han,et al. Global asymptotic stability analysis for delayed neural networks using a matrix-based quadratic convex approach , 2014, Neural Networks.
[130] Paulo Tabuada,et al. Towards Robustness for Cyber-Physical Systems , 2014, IEEE Transactions on Automatic Control.
[131] Qing-Long Han,et al. New Lyapunov-Krasovskii Functionals for Global Asymptotic Stability of Delayed Neural Networks , 2009, IEEE Trans. Neural Networks.
[132] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[133] Yunghsiang Sam Han,et al. Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data , 2014, IEEE Signal Processing Letters.
[134] Radha Poovendran,et al. A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.
[135] Anna Scaglione,et al. Robust Decentralized State Estimation and Tracking for Power Systems via Network Gossiping , 2013, IEEE Journal on Selected Areas in Communications.
[136] Q. Han,et al. Event‐triggered H∞ control for a class of nonlinear networked control systems using novel integral inequalities , 2017 .
[137] Zhu Han,et al. Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.
[138] Feng Qian,et al. Network-based leader-following consensus of nonlinear multi-agent systems via distributed impulsive control , 2017, Inf. Sci..
[139] Jinping Hao,et al. Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.
[140] Jiming Chen,et al. An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems , 2013, IEEE Transactions on Industrial Informatics.
[141] Issarachai Ngamroo,et al. Robust LFC in a Smart Grid With Wind Power Penetration by Coordinated V2G Control and Frequency Controller , 2014, IEEE Transactions on Smart Grid.
[142] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[143] Qing-Long Han,et al. Distributed networked control systems: A brief overview , 2017, Inf. Sci..