Cyber physical attacks with control objectives and detection constraints
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[2] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[3] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[4] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[5] Soummya Kar,et al. Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[7] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[8] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[9] K. J. Burnham,et al. 4-dimensional control of a remotely piloted vehicle , 1996 .
[10] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[11] B. Molinari. A strong controllability and observability in linear multivariable control , 1976 .
[12] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[13] L. Silverman,et al. Structure and stability of discrete-time optimal systems , 1971 .
[14] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[15] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[16] Soummya Kar,et al. Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.
[17] Jason L. Speyer,et al. Stochastic Processes, Estimation, and Control , 2008, Advances in design and control.
[18] Soummya Kar,et al. Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).
[19] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.