暂无分享,去创建一个
[1] Soummya Kar,et al. Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).
[2] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[3] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[4] Nell Nelson,et al. The Impact of Dragonfly Malware on Industrial Control Systems , 2020 .
[5] Emrah Akyol,et al. Hierarchical Multi-stage Gaussian Signaling Games: Strategic Communication and Control , 2016 .
[6] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[7] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[8] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[9] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[10] Tamer Basar,et al. Simultaneous design of measurement and control strategies for stochastic systems with feedback , 1989, Autom..
[11] Tamer Basar,et al. Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats , 2017, GameSec.
[12] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[13] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[14] Michail Maniatakos,et al. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.
[15] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[16] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] Soummya Kar,et al. Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[18] Ruochi Zhang,et al. Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.
[19] Tamer Basar,et al. Secure Sensor Design Against Undetected Infiltration: Minimum Impact-Minimum Damage , 2018, ArXiv.
[20] Tamer Başar,et al. Hierarchical multistage Gaussian signaling games in noncooperative communication and control systems , 2016, Autom..
[21] Tamer Basar,et al. Deceptive Multi-dimensional Information Disclosure over a Gaussian Channel* , 2018, 2018 Annual American Control Conference (ACC).
[22] Efe A. Ok. Preliminaries of Real Analysis, from Real Analysis with Economic Applications , 2007 .
[23] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.
[24] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[25] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[26] Tamer Basar,et al. Dynamic Information Disclosure for Deception* , 2018, 2018 IEEE Conference on Decision and Control (CDC).