Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[2] C.N. Hadjicostis,et al. Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.
[3] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[4] B. Molinari,et al. Extended controllability and observability for linear systems , 1976 .
[5] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[6] Giedre Sabaliauskaite,et al. Detecting injection attacks in linear time invariant systems , 2013, 2013 IEEE Conference on Cybernetics and Intelligent Systems (CIS).
[7] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[8] Lang Tong,et al. Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[9] Harry L. Trentelman,et al. Control theory for linear systems , 2002 .
[10] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[11] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[12] Yue Zhao,et al. Fundamental limits of cyber-physical security in smart power grids , 2013, 52nd IEEE Conference on Decision and Control.
[13] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[14] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[15] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[16] Quanyan Zhu,et al. A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.
[17] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[18] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[19] K. J. Burnham,et al. 4-dimensional control of a remotely piloted vehicle , 1996 .
[20] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[21] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[22] B. Molinari. A strong controllability and observability in linear multivariable control , 1976 .
[23] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[24] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[25] Alberto Speranzon,et al. On analysis and design of stealth-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[26] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[27] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[28] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[29] L. Silverman,et al. Structure and stability of discrete-time optimal systems , 1971 .
[30] Alvaro A. Cárdenas,et al. Cyber-Physical Systems Attestation , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.
[31] Marija D. Ilic,et al. Dynamics and control of large electric power systems , 2000 .
[32] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[33] Marios M. Polycarpou,et al. A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.
[34] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[35] Soummya Kar,et al. Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).