Cyber-Physical Systems Security: a Systematic Mapping Study
暂无分享,去创建一个
Maria Domenica Di Benedetto | Alessandro D'Innocenzo | Ivano Malavolta | Yuriy Zacchia Lun | Francesco Smarra | M. D. Benedetto | I. Malavolta | F. Smarra | A. D’innocenzo | Yu Lun
[1] Paulo Tabuada,et al. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.
[2] Roel Wieringa,et al. Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.
[3] Panos J. Antsaklis,et al. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.
[4] Peng Liang,et al. A systematic mapping study on technical debt and its management , 2015, J. Syst. Softw..
[5] Sriram Vishwanath,et al. One breaker is enough: Hidden topology attacks on power grids , 2015, 2015 IEEE Power & Energy Society General Meeting.
[6] William H. Sanders,et al. Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.
[7] Maria Domenica Di Benedetto,et al. On stability of time-inhomogeneous Markov jump linear systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[8] Beibei Li,et al. DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.
[9] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using a moving target approach , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[10] Aranya Chakrabortty,et al. A Real-Time Attack Localization Algorithm for Large Power System Networks Using Graph-Theoretic Techniques , 2015, IEEE Transactions on Smart Grid.
[11] William H. Sanders,et al. SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.
[12] Pramod P. Khargonekar,et al. Smart grids cyber-physical security as a malicious data attack: An innovation approach , 2017 .
[13] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[14] Tomohisa Hayakawa,et al. Networked Control Under Random and Malicious Packet Losses , 2016, IEEE Transactions on Automatic Control.
[15] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[16] Zuyi Li,et al. Masking Transmission Line Outages via False Data Injection Attacks , 2016, IEEE Transactions on Information Forensics and Security.
[17] Jiming Chen,et al. Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks , 2017, IEEE Transactions on Industrial Electronics.
[18] Insup Lee,et al. Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.
[19] Lang Tong,et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.
[20] Danda B. Rawat,et al. Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.
[21] Sanjit A. Seshia,et al. Introduction to Embedded Systems , 2009 .
[22] Claes Wohlin,et al. Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.
[23] Adnan Anwar,et al. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements , 2016, J. Comput. Syst. Sci..
[24] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[25] By Radha Poovendran. Cyber – Physical Systems : Close Encounters Between Two Parallel Worlds , 2010 .
[26] Changchun Hua,et al. An algebraic detection approach for control systems under multiple stochastic cyber-attacks , 2015, IEEE/CAA Journal of Automatica Sinica.
[27] Bruno Sinopoli,et al. A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems , 2017, IEEE Transactions on Control of Network Systems.
[28] Tansel Yucelen,et al. An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[29] Yan Pang,et al. Resilient Nonlinear Control for Attacked Cyber-Physical Systems , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[30] Akiko Takeda,et al. Cyber Security Analysis of Power Networks by Hypergraph Cut Algorithms , 2015, IEEE Transactions on Smart Grid.
[31] Quanyan Zhu,et al. Decision and Game Theory for Security , 2016, Lecture Notes in Computer Science.
[32] Deepa Kundur,et al. Coordinated variable structure switching in smart power systems: attacks and mitigation , 2012, HiCoNS '12.
[33] Paulo Tabuada,et al. Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[34] Qing-Long Han,et al. Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.
[35] Lang Tong,et al. Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.
[36] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[37] Md. Apel Mahmud,et al. Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.
[38] Yuan Xue,et al. Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach , 2012, 2012 5th International Symposium on Resilient Control Systems.
[39] Philippe Bonnet,et al. Repeatability and workability evaluation of SIGMOD 2011 , 2011, SGMD.
[40] Sriram Vishwanath,et al. Optimal data attacks on power grids: Leveraging detection & measurement jamming , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[41] Muhammad Ali Babar,et al. Systematic reviews in software engineering: An empirical investigation , 2013, Inf. Softw. Technol..
[42] Ashish Tiwari,et al. Safety envelope for security , 2014, HiCoNS.
[43] Lingzhi Zhu,et al. Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control , 2018, IEEE Transactions on Industrial Informatics.
[44] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[45] Xinyu Yang,et al. On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.
[46] Farrokh Aminifar,et al. Cybersecurity in Distributed Power Systems , 2017, Proceedings of the IEEE.
[47] Hyungbo Shim,et al. Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors , 2018, IEEE Transactions on Automatic Control.
[48] M. Ribbens-Pavella,et al. Bad Data Identification Methods In Power System State Estimation-A Comparative Study , 1985, IEEE Transactions on Power Apparatus and Systems.
[49] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[50] Zuyi Li,et al. Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.
[51] Jinping Hao,et al. Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.
[52] Paulo Tabuada,et al. Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).
[53] Anthony Tzes,et al. Covert attack on a discrete-time system with limited use of the available disruption resources , 2015, 2015 European Control Conference (ECC).
[54] Weiyi Liu,et al. Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems , 2014, J. Aerosp. Inf. Syst..
[55] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[56] Claes Wohlin,et al. Systematic literature studies: Database searches vs. backward snowballing , 2012, Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement.
[57] Edmond Jonckheere,et al. Statistical Structure Learning to Ensure Data Integrity in Smart Grid , 2015, IEEE Transactions on Smart Grid.
[58] Jules White,et al. Cyber-physical security challenges in manufacturing systems , 2014 .
[59] Walid Saad,et al. Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective , 2016, IEEE Transactions on Smart Grid.
[60] Insup Lee,et al. Attack-resilient minimum mean-squared error estimation , 2014, 2014 American Control Conference.
[61] O. Dieste,et al. Developing Search Strategies for Detecting Relevant Experiments for Systematic Reviews , 2007, First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007).
[62] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[63] Zuyi Li,et al. Trilevel Modeling of Cyber Attacks on Transmission Lines , 2017, IEEE Transactions on Smart Grid.
[64] Yun Gu,et al. Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids , 2014 .
[65] John Lygeros,et al. Cyber-Attacks in the Automatic Generation Control , 2015 .
[66] Georgia Sakellari,et al. Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.
[67] J. Y. Keller,et al. Monitoring of stealthy attack in networked control systems , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).
[68] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[69] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[70] Hyungbo Shim,et al. On Redundant Observability: From Security Index to Attack Detection and Resilient State Estimation , 2018, IEEE Transactions on Automatic Control.
[71] Lingkun Fu,et al. DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[72] Babu Narayanan,et al. POWER SYSTEM STABILITY AND CONTROL , 2015 .
[73] Paulo Tabuada,et al. Secure state estimation and control using multiple (insecure) observers , 2014, 53rd IEEE Conference on Decision and Control.
[74] Jacob Cohen,et al. Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. , 1968 .
[75] H. Ishii,et al. Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation , 2015, IEEE Transactions on Power Systems.
[76] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[77] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[78] Maria Domenica Di Benedetto,et al. Further results on fault detection and isolation of malicious nodes in Multi-hop Control Networks , 2015, 2015 European Control Conference (ECC).
[79] Hyungbo Shim,et al. Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .
[80] Nicanor Quijano,et al. Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures , 2017, IEEE Transactions on Smart Grid.
[81] Chao Yang,et al. Optimal Linear Attack on Cyber Physical Systems With Multiplicative Noise , 2018, IEEE Access.
[82] Yongduan Song,et al. Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries , 2018, Inf. Sci..
[83] David K. Y. Yau,et al. Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control , 2017, IEEE Transactions on Information Forensics and Security.
[84] Edward A. Lee,et al. Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .
[85] Ling Shi,et al. The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.
[86] Tomohisa Hayakawa,et al. Event-triggered control over unreliable networks subject to jamming attacks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[87] Sridhar Adepu,et al. An Investigation into the Response of a Water Treatment System to Cyber Attacks , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[88] Song Tan,et al. LPAttack: Leverage point attacks against state estimation in smart grid , 2014, 2014 IEEE Global Communications Conference.
[89] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[90] Hongtao Sun,et al. Security-based resilient event-triggered control of networked control systems under denial of service attacks , 2019, J. Frankl. Inst..
[91] Deepa Kundur,et al. A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.
[92] Kai Petersen,et al. Guidelines for conducting systematic mapping studies in software engineering: An update , 2015, Inf. Softw. Technol..
[93] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[94] Karl Henrik Johansson,et al. Voltage control for interconnected microgrids under adversarial actions , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).
[95] Tao Jiang,et al. Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications , 2018, IEEE Transactions on Smart Grid.
[96] Quanyan Zhu,et al. Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.
[97] Osama A. Mohammed,et al. A Survey on Smart Grid Cyber-Physical System Testbeds , 2017, IEEE Communications Surveys & Tutorials.
[98] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[99] Kai Petersen,et al. Evaluating strategies for study selection in systematic literature studies , 2014, ESEM '14.
[100] Fuchun Sun,et al. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach , 2016, Int. J. Syst. Sci..
[101] Carlos Murguia,et al. Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[102] Michail Maniatakos,et al. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.
[103] Ling Shi,et al. A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[104] Ying Jun Zhang,et al. Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation , 2014, IEEE Journal on Selected Areas in Communications.
[105] Sam Malek,et al. A Systematic Survey of Self-Protecting Software Systems , 2014, ACM Trans. Auton. Adapt. Syst..
[106] Valentina Casola,et al. A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices , 2013, IRI.
[107] Lingfeng Wang,et al. Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.
[108] Zhu Han,et al. Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.
[109] Hyungbo Shim,et al. Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach , 2015, 2015 European Control Conference (ECC).
[110] Soummya Kar,et al. Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.
[111] Joe H. Chow,et al. A toolbox for power system dynamics and control engineering education and research , 1992 .
[112] Mohammad Shahidehpour,et al. The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .
[113] Aditya Ashok,et al. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.
[114] Walid Saad,et al. Smart grid data injection attacks: To defend or not? , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[115] Cheolhyeon Kwon,et al. Hybrid robust controller design: Cyber attack attenuation for Cyber-Physical Systems , 2013, 52nd IEEE Conference on Decision and Control.
[116] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[117] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[118] Paulo Tabuada,et al. Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks , 2014, 53rd IEEE Conference on Decision and Control.
[119] Junjie Yan,et al. To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.
[120] Jianhui Wang,et al. Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.
[121] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[122] Maria Domenica Di Benedetto,et al. Optimal robust control and a separation principle for polytopic time-inhomogeneous Markov jump linear systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[123] Éva Tardos,et al. Algorithm design , 2005 .
[124] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[125] Elwood S. Buffa,et al. Graph Theory with Applications , 1977 .
[126] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[127] Pietro Tesi,et al. Networked Control of Nonlinear Systems under Denial-of-Service , 2016 .
[128] Mani Srivastava,et al. PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.
[129] Tao Yue,et al. Model-based security engineering for cyber-physical systems: A systematic mapping study , 2017, Inf. Softw. Technol..
[130] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[131] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[132] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[133] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[134] Maria Domenica Di Benedetto,et al. Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks , 2016, Autom..
[135] Wei Ren,et al. Stealthy attacks in power systems: Limitations on manipulating the estimation deviations caused by switching network topologies , 2014, 53rd IEEE Conference on Decision and Control.
[136] Petros G. Voulgaris,et al. Dual rate control for security in cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[137] Deepa Kundur,et al. A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis , 2016, IEEE Transactions on Smart Grid.
[138] Henrik Sandberg,et al. Survey and New Directions for Physics-Based Attack Detection in Control Systems , 2016 .
[139] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[140] Deepa Kundur,et al. Tuning out of phase: Resonance attacks , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[141] Fuad E. Alsaadi,et al. On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors , 2017, Neurocomputing.
[142] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.
[143] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[144] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[145] Peng Deng,et al. Cross-Layer Codesign for Secure Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[146] Quanyan Zhu,et al. Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.
[147] Alie El-Din Mady,et al. A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration , 2018, Proceedings of the IEEE.
[148] Cesare Tinelli,et al. Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.
[149] Bala Venkatesh,et al. Optimal reconfiguration of radial distribution systems to maximize loadability , 2004 .
[150] H. Vincent Poor,et al. Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[151] Xenofon D. Koutsoukos,et al. Energy-based attack detection in networked control systems , 2014, HiCoNS.
[152] Xinyu Yang,et al. Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid , 2017, IEEE Internet of Things Journal.
[153] T. Greenhalgh,et al. Effectiveness and efficiency of search methods in systematic reviews of complex evidence: audit of primary sources , 2005, BMJ : British Medical Journal.
[154] Giorgio Battistelli,et al. Distributed Joint Attack Detection and Secure State Estimation , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[155] Yang Liu,et al. Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..
[156] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[157] Yuancheng Li,et al. State summation for detecting false data attack on smart grid , 2014 .
[158] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[159] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[160] Osama A. Mohammed,et al. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit , 2017, NDSS.
[161] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[162] Fangxing Li,et al. Small test systems for power system economic studies , 2010, IEEE PES General Meeting.
[163] Jin Dong,et al. Finite energy and bounded attacks on control system sensor signals , 2014, 2014 American Control Conference.
[164] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[165] Emanuele Garone,et al. Secure dynamic state estimation via local estimators , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[166] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[167] Norbert Wiener,et al. Cybernetics. , 1948, Scientific American.
[168] Nektarios Georgios Tsoutsos,et al. Manufacturing and Security Challenges in 3D Printing , 2016 .
[169] Karl Henrik Johansson,et al. Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.
[170] Soummya Kar,et al. Information flow for security in control systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[171] Jeanine Weekes Schroer,et al. The Finite String Newsletter Abstracts of Current Literature Glisp User's Manual , 2022 .
[172] Michael Kearns. Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology , 2010 .
[173] Zhu Han,et al. Effect of stealthy bad data injection on network congestion in market based power system , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[174] Quanyan Zhu,et al. A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.
[175] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[176] Hadis Karimipour,et al. Robust Massively Parallel Dynamic State Estimation of Power Systems Against Cyber-Attack , 2018, IEEE Access.
[177] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[178] Florian Dörfler,et al. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[179] Beibei Li,et al. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..
[180] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[181] Karl Henrik Johansson,et al. Distributed Sensor and Actuator Reconfiguration for Fault-Tolerant Networked Control Systems , 2018, IEEE Transactions on Control of Network Systems.
[182] Insup Lee,et al. Attack resilient state estimation for autonomous robotic systems , 2014, 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[183] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[184] Edward A. Lee. Computing Foundations and Practice for Cyber- Physical Systems: A Preliminary Report , 2007 .
[185] Matt Bishop,et al. The Art and Science of Computer Security , 2002 .
[186] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[187] Peter Rodgers,et al. eulerAPE: Drawing Area-Proportional 3-Venn Diagrams Using Ellipses , 2014, PloS one.
[188] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[189] Sonia Martínez,et al. On Multi-Input Controllable Linear Systems Under Unknown Periodic DoS Jamming Attacks , 2013, SIAM Conf. on Control and its Applications.
[190] Oliver Kosut,et al. Cyber attacks on AC state estimation: Unobservability and physical consequences , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.
[191] Ling Shi,et al. Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.
[192] Hamed Mohsenian Rad,et al. Dynamic load altering attacks in smart grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[193] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[194] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[195] Nikhil Chopra,et al. On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).
[196] H. Vincent Poor,et al. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.
[197] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[198] Kris Tiri,et al. Side-Channel Attack Pitfalls , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[199] Daniela Chrenko,et al. An efficient Intrusion Detection System against cyber-physical attacks in the smart grid , 2018, Comput. Electr. Eng..
[200] Jennie Popay,et al. Guidance on the conduct of narrative synthesis in systematic Reviews. A Product from the ESRC Methods Programme. Version 1 , 2006 .
[201] Panganamala Ramana Kumar,et al. Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[202] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.
[203] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[204] Cheolhyeon Kwon,et al. Analytical Analysis of Cyber Attacks on Unmanned Aerial Systems , 2013 .
[205] Oliver Kosut,et al. Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation , 2015, IEEE Transactions on Power Systems.
[206] Nils Ole Tippenhauer,et al. SWaT: a water treatment testbed for research and training on ICS security , 2016, 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater).
[207] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[208] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[209] Jitesh H. Panchal,et al. Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs , 2015, IEEE Transactions on Smart Grid.
[210] Wei Yu,et al. On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.
[211] Daniela Cruzes,et al. Research synthesis in software engineering: A tertiary study , 2011, Inf. Softw. Technol..
[212] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[213] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[214] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[215] Dominique Sauter,et al. Input reconstruction for networked control systems subject to deception attacks and data losses on control signals , 2016, Int. J. Syst. Sci..
[216] Sriram Vishwanath,et al. Optimal hidden SCADA attacks on power grid: A graph theoretic approach , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[217] Fuad E. Alsaadi,et al. Security‐guaranteed filtering for discrete‐time stochastic delayed systems with randomly occurring sensor saturations and deception attacks , 2017 .
[218] Peter F. Al-Hokayem. Stability Analysis of Networked Control Systems , 2003 .
[219] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[220] Chao Lan,et al. Anomaly Detection , 2018, Encyclopedia of GIS.
[221] Kai Petersen,et al. Systematic Mapping Studies in Software Engineering , 2008, EASE.
[222] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[223] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[224] Maria Domenica Di Benedetto,et al. Fault Tolerant Control of Multi-Hop Control Networks , 2013, IEEE Transactions on Automatic Control.
[225] Le Xie,et al. Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.
[226] Karl Henrik Johansson,et al. Efficient Computations of a Security Index for False Data Attacks in Power Networks , 2012, IEEE Transactions on Automatic Control.
[227] Siddhartha Kumar Khaitan,et al. Cyber Physical Systems Approach to Smart Electric Power Grid , 2015 .
[228] George J. Pappas,et al. State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.
[229] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.
[230] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[231] Arman Sargolzaei,et al. Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network , 2016 .
[232] Walid Saad,et al. Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.
[233] W. P. M. H. Heemels,et al. Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.
[234] Danial Senejohnny,et al. A Jamming-Resilient Algorithm for Self-Triggered Network Coordination , 2016, IEEE Transactions on Control of Network Systems.
[235] Iman Shames,et al. Secure and private control using semi-homomorphic encryption , 2017 .
[236] Chunjie Zhou,et al. Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems , 2018, IEEE Transactions on Industrial Electronics.
[237] Jun Hu,et al. On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks , 2016, Int. J. Gen. Syst..
[238] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[239] Amir M. Tahmasebi,et al. Experimental Identification and Analysis of the Dynamics of a PHANToM Premium 1.5A Haptic Device , 2008, PRESENCE: Teleoperators and Virtual Environments.
[240] Joe H. Chow,et al. Power System Dynamics and Stability: With Synchrophasor Measurement and Power System Toolbox 2e: With Synchrophasor Measurement and Power System Toolbox , 2017 .
[241] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[242] I. Lee,et al. A Markovian Approach for Attack Resilient Control of Mobile Robotic Systems , 2015 .
[243] Zuyi Li,et al. False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.
[244] Xiaodong Wang,et al. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.
[245] Michel Verleysen,et al. Nonlinear Dimensionality Reduction , 2021, Computer Vision.
[246] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[247] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[248] Ling Shi,et al. Online Deception Attack against Remote State Estimation , 2014 .
[249] Jing Huang,et al. State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.
[250] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[251] Nirwan Ansari,et al. CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[252] Zhu Han,et al. Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[253] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[254] Lalitha Sankar,et al. Implementation of unobservable state-preserving topology attacks , 2015, 2015 North American Power Symposium (NAPS).
[255] Hamed Mohsenian-Rad,et al. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.
[256] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[257] Rajnikant Sharma,et al. Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control , 2015, CPS-SPC '15.
[258] Ravishankar K. Iyer,et al. Self-Healing Attack-Resilient PMU Network for Power System Operation , 2018, IEEE Transactions on Smart Grid.
[259] Soummya Kar,et al. Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[260] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[261] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[262] T. Blumensath,et al. Theory and Applications , 2011 .
[263] Debapriya Das,et al. Voltage Stability Analysis of Radial Distribution Networks , 2001 .
[264] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[265] Pearl Brereton,et al. Performing systematic literature reviews in software engineering , 2006, ICSE.
[266] Keke Gai,et al. Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.
[267] Yuan Xue,et al. Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.
[268] Siu-Ming Yiu,et al. Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[269] Deepa Kundur,et al. A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.
[270] Paulo Tabuada,et al. Minimax control for cyber-physical systems under network packet scheduling attacks , 2013, HiCoNS '13.
[271] P. Pardalos,et al. Handbook of global optimization , 1995 .
[272] Pearl Brereton,et al. Lessons from applying the systematic literature review process within the software engineering domain , 2007, J. Syst. Softw..
[273] Sandip Roy,et al. Security concepts for the dynamics of autonomous vehicle networks , 2014, Autom..
[274] Riccardo Muradore,et al. A Formal Approach to Cyber-Physical Attacks , 2016, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[275] Xiang Li,et al. Rate alteration attacks in smart grid , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[276] Igor Nikiforov,et al. Sequential monitoring of SCADA systems against cyber/physical attacks , 2015 .
[277] Paulo Tabuada,et al. Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving , 2015, 2015 American Control Conference (ACC).
[278] Dominique Sauter,et al. Active GLR detector for resilient LQG controller in networked control systems , 2015 .
[279] Hamed Mohsenian Rad,et al. False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[280] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[281] Lang Tong,et al. Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.
[282] Tamer Basar,et al. One-stage control over an adversarial channel with finite codelength , 2011, IEEE Conference on Decision and Control and European Control Conference.
[283] K. Narendra,et al. Identification and Optimization of Aircraft Dynamics , 1973 .
[284] Aditya Ashok,et al. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid , 2017, Proceedings of the IEEE.
[285] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).
[286] J. A. Bondy,et al. Graph Theory with Applications , 1978 .
[287] Junbo Zhao,et al. Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.
[288] Nicanor Quijano,et al. Controllability of Dynamical Systems: Threat Models and Reactive Security , 2013, GameSec.
[289] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[290] Wen-Long Chin,et al. Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.
[291] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[292] Alexander Egyed,et al. A systematic mapping study of search-based software engineering for software product lines , 2015, Inf. Softw. Technol..
[293] David K. Y. Yau,et al. Integrity Attacks on Real-Time Pricing in Electric Power Grids , 2015, TSEC.
[294] Katherine R. Davis,et al. Power flow cyber attacks and perturbation-based defense , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[295] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[296] Lianping Chen,et al. Towards an Evidence-Based Understanding of Electronic Data Sources , 2010, EASE.
[297] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[298] Claes Wohlin,et al. Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.
[299] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[300] Zhihua Qu,et al. Secure Power Systems Against Malicious Cyber-Physical Data Attacks: Protection and Identification , 2012 .
[301] Insup Lee,et al. Medical Cyber Physical Systems , 2010, Design Automation Conference.
[302] Yassine Lakhnech,et al. Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems , 2004, Lecture Notes in Computer Science.
[303] Singiresu S. Rao. Engineering Optimization : Theory and Practice , 2010 .
[304] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[305] Paulo Tabuada,et al. SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[306] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[307] Teodor Sommestad,et al. SCADA system cyber security — A comparison of standards , 2010, IEEE PES General Meeting.
[308] Marilyn Wolf,et al. False data injection attacks , 2019, Cloud Control Systems.
[309] Calin Belta,et al. Anomaly detection in cyber-physical systems: A formal methods approach , 2014, 53rd IEEE Conference on Decision and Control.
[310] Zuyi Li,et al. Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.
[311] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[312] Pietro Tesi,et al. Resilient Control under Denial-of-Service , 2013, ArXiv.
[313] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[314] G. Manimaran,et al. Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.
[315] Shreyas Sundaram,et al. The wireless control network: Monitoring for malicious behavior , 2010, 49th IEEE Conference on Decision and Control (CDC).
[316] Ravishankar K. Iyer,et al. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.
[317] Alberto Speranzon,et al. On analysis and design of stealth-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[318] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[319] Rongxing Lu,et al. Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.
[320] Robert C. Green,et al. Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .
[321] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[322] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[323] Zahir Tari,et al. Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..
[324] Harshad Khadilkar,et al. High Confidence Networked Control for Next Generation Air Transportation Systems , 2014, IEEE Transactions on Automatic Control.
[325] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[326] Tyrone L. Vincent,et al. An abrupt change detection heuristic with applications to cyber data attacks on power systems , 2014, 2014 American Control Conference.
[327] Dario Ambrosini,et al. Data-driven model predictive control using random forests for building energy optimization and climate control , 2018, Applied Energy.
[328] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[329] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[330] Mehul Motani,et al. Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.
[331] Douglas C. Schmidt,et al. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems , 2017, Int. J. Interact. Multim. Artif. Intell..
[332] Ali Davoudi,et al. Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids , 2017, IEEE Transactions on Industrial Informatics.
[333] H. D. Rombach,et al. The Goal Question Metric Approach , 1994 .
[334] Tomohisa Hayakawa,et al. Analysis of Stochastic Switched Systems With Application to Networked Control Under Jamming Attacks , 2017, IEEE Transactions on Automatic Control.
[335] Peter W. Sauer,et al. Power System Dynamics and Stability , 1997 .
[336] Isao Ono,et al. Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs , 2016, IEEE Transactions on Smart Grid.
[337] Bruno Sinopoli,et al. A moving target approach for identifying malicious sensors in control systems , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[338] Karin Sallhammar,et al. Stochastic Models for Combined Security and Dependability Evaluation , 2007 .
[339] Lalitha Sankar,et al. Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.
[340] Ling Shi,et al. Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[341] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[342] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[343] Gang Tao,et al. A novel nonlinear resilient control for a quadrotor UAV via backstepping control and nonlinear disturbance observer , 2016, Nonlinear Dynamics.
[344] N. Lawrence Ricker,et al. Model predictive control of a continuous, nonlinear, two-phase reactor , 1993 .
[345] Peter Xiaoping Liu,et al. A stochastic game approach to the security issue of networked control systems under jamming attacks , 2014, J. Frankl. Inst..
[346] Yilin Mo,et al. Security in cyber-physical systems: Controller design against Known-Plaintext Attack , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[347] Robert J. Elliott,et al. On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[348] György Dán,et al. Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.
[349] Ling Shi,et al. Event-based attack against remote state estimation , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[350] G. Manimaran,et al. Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.
[351] Yilin Mo,et al. Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.
[352] Zuyi Li,et al. Transmission Line Rating Attack in Two-Settlement Electricity Markets , 2016, IEEE Transactions on Smart Grid.
[353] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[354] Ruggero Carli,et al. A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[355] Lang Tong,et al. Dynamic attacks on power systems economic dispatch , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[356] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[357] Ying Jun Zhang,et al. False-data injection attack to control real-time price in electricity market , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[358] Karl Henrik Johansson,et al. The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..
[359] Mihalis Yannakakis,et al. Joint Cyber and Physical Attacks on Power Grids: Graph Theoretical Approaches for Information Recovery , 2015, SIGMETRICS 2015.
[360] Michail Maniatakos,et al. The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.
[361] Qun Li,et al. Defending against Unidentifiable Attacks in Electric Power Grids , 2013, IEEE Transactions on Parallel and Distributed Systems.
[362] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[363] Zidong Wang,et al. Event-based security control for discrete-time stochastic systems , 2016 .
[364] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[365] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[366] R. K. Ro D G E R S A N D A N G E L A S Ow D E N,et al. Testing Methodological Guidance on the Conduct of Narrative Synthesis in Systematic Reviews Effectiveness of Interventions to Promote Smoke Alarm Ownership and Function , 2008 .
[367] Juan E. Tapiador,et al. Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.
[368] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[369] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[370] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[371] Flemming Nielson,et al. Denial-of-Service Security Attack in the Continuous-Time World , 2014, FORTE.
[372] Amr M. Youssef,et al. Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.
[373] Riccardo Muradore,et al. Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.
[374] Hao Liang,et al. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.
[375] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[376] Paulo Tabuada,et al. Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[377] Colleen Swanson,et al. SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.
[378] Rong Zheng,et al. Stealth false data injection using independent component analysis in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[379] Muhammad Ali Babar,et al. Identifying relevant studies in software engineering , 2011, Inf. Softw. Technol..
[380] William S. Levine,et al. The Control Handbook , 2005 .
[381] Tong Heng Lee,et al. Design and implementation of a robust and nonlinear flight control system for an unmanned helicopter , 2011 .
[382] Radha Poovendran,et al. Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.
[383] Shuai Liu,et al. Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks , 2016, Neurocomputing.
[384] Deepa Kundur,et al. A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[385] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[386] Deepa Kundur,et al. Biologically Inspired Hierarchical Cyber-Physical Multi-agent Distributed Control Framework for Sustainable Smart Grids , 2015 .
[387] Guoxiang Gu,et al. Secure networked control systems against replay attacks without injecting authentication noise , 2015, 2015 American Control Conference (ACC).
[388] Henry Muccini,et al. A Study on MDE Approaches for Engineering Wireless Sensor Networks , 2014, 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications.
[389] Dejan Nickovic,et al. Monitoring Temporal Properties of Continuous Signals , 2004, FORMATS/FTRTFT.
[390] Derui Ding,et al. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..
[391] Ling Shi,et al. A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..
[392] Zuyi Li,et al. Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.
[393] Ehab Al-Shaer,et al. Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.
[394] Donghua Zhou,et al. Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.
[395] Zhu Han,et al. Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.
[396] H. Vincent Poor,et al. Maximum Distortion Attacks in Electricity Grids , 2016, IEEE Transactions on Smart Grid.
[397] Changyun Wen,et al. Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .
[398] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.