Stochastic Detector against linear deception attacks on remote state estimation
暂无分享,去创建一个
[1] Ling Shi,et al. Stochastic event-triggered sensor scheduling for remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.
[2] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[3] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[4] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[5] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.
[6] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[7] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[8] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[9] Ling Shi,et al. Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.
[10] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[11] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[12] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[13] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[14] Tomoyuki Ishida,et al. The 28 th International Conference on Distributed Computing Systems Workshops , 2008 .
[15] A. Willsky,et al. A generalized likelihood ratio approach to the detection and estimation of jumps in linear systems , 1976 .
[16] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[17] Bruno Sinopoli,et al. Detection in Adversarial Environments , 2014, IEEE Transactions on Automatic Control.
[18] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[19] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[20] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).