Evaluation on Passive System Identification and Covert Misappropriation Attacks in Large Pressurized Heavy Water Reactors
暂无分享,去创建一个
[1] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[2] Pinar Çivicioglu,et al. Backtracking Search Optimization Algorithm for numerical optimization problems , 2013, Appl. Math. Comput..
[3] Amitava Gupta,et al. An Interval Approach for Robust Control of a Large PHWR with PID Controllers , 2015, IEEE Transactions on Nuclear Science.
[4] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[5] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[6] Raphael Machado,et al. Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[7] Alan Oliveira de Sá,et al. Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems , 2020, Mob. Networks Appl..
[8] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[9] Raphael Machado,et al. A controller design for mitigation of passive system identification attacks in networked control systems , 2017, Journal of Internet Services and Applications.
[10] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[11] Amitava Gupta,et al. Stability of Networked Control System (NCS) with discrete time-driven PID controllers , 2015 .
[12] Manoj Kumar,et al. Networked Control of a Large Pressurized Heavy Water Reactor (PHWR) With Discrete Proportional-Integral-Derivative (PID) Controllers , 2013, IEEE Transactions on Nuclear Science.
[13] B. Goswami,et al. Network Control System Applied to a Large Pressurized Heavy Water Reactor , 2006, IEEE Transactions on Nuclear Science.