Cyber-Physical Systems Security: a Systematic Mapping Study

Abstract Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds light on how security is actually addressed when dealing with cyber-physical systems from an automatic control perspective. The provided map of 138 selected studies is defined empirically and is based on, for instance, application fields, various system components, related algorithms and models, attacks characteristics and defense strategies. It presents a powerful comparison framework for existing and future research on this hot topic, important for both industry and academia.

[1]  Paulo Tabuada,et al.  Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.

[2]  Roel Wieringa,et al.  Requirements engineering paper classification and evaluation criteria: a proposal and a discussion , 2005, Requirements Engineering.

[3]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[4]  Peng Liang,et al.  A systematic mapping study on technical debt and its management , 2015, J. Syst. Softw..

[5]  Sriram Vishwanath,et al.  One breaker is enough: Hidden topology attacks on power grids , 2015, 2015 IEEE Power & Energy Society General Meeting.

[6]  William H. Sanders,et al.  Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.

[7]  Maria Domenica Di Benedetto,et al.  On stability of time-inhomogeneous Markov jump linear systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[8]  Beibei Li,et al.  DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using a moving target approach , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[10]  Aranya Chakrabortty,et al.  A Real-Time Attack Localization Algorithm for Large Power System Networks Using Graph-Theoretic Techniques , 2015, IEEE Transactions on Smart Grid.

[11]  William H. Sanders,et al.  SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.

[12]  Pramod P. Khargonekar,et al.  Smart grids cyber-physical security as a malicious data attack: An innovation approach , 2017 .

[13]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[14]  Tomohisa Hayakawa,et al.  Networked Control Under Random and Malicious Packet Losses , 2016, IEEE Transactions on Automatic Control.

[15]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[16]  Zuyi Li,et al.  Masking Transmission Line Outages via False Data Injection Attacks , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Jiming Chen,et al.  Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks , 2017, IEEE Transactions on Industrial Electronics.

[18]  Insup Lee,et al.  Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.

[19]  Lang Tong,et al.  Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.

[20]  Danda B. Rawat,et al.  Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.

[21]  Sanjit A. Seshia,et al.  Introduction to Embedded Systems , 2009 .

[22]  Claes Wohlin,et al.  Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.

[23]  Adnan Anwar,et al.  Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements , 2016, J. Comput. Syst. Sci..

[24]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[25]  By Radha Poovendran Cyber – Physical Systems : Close Encounters Between Two Parallel Worlds , 2010 .

[26]  Changchun Hua,et al.  An algebraic detection approach for control systems under multiple stochastic cyber-attacks , 2015, IEEE/CAA Journal of Automatica Sinica.

[27]  Bruno Sinopoli,et al.  A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems , 2017, IEEE Transactions on Control of Network Systems.

[28]  Tansel Yucelen,et al.  An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[29]  Yan Pang,et al.  Resilient Nonlinear Control for Attacked Cyber-Physical Systems , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[30]  Akiko Takeda,et al.  Cyber Security Analysis of Power Networks by Hypergraph Cut Algorithms , 2015, IEEE Transactions on Smart Grid.

[31]  Quanyan Zhu,et al.  Decision and Game Theory for Security , 2016, Lecture Notes in Computer Science.

[32]  Deepa Kundur,et al.  Coordinated variable structure switching in smart power systems: attacks and mitigation , 2012, HiCoNS '12.

[33]  Paulo Tabuada,et al.  Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[34]  Qing-Long Han,et al.  Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks , 2017, IEEE Sensors Journal.

[35]  Lang Tong,et al.  Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.

[36]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[37]  Md. Apel Mahmud,et al.  Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.

[38]  Yuan Xue,et al.  Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach , 2012, 2012 5th International Symposium on Resilient Control Systems.

[39]  Philippe Bonnet,et al.  Repeatability and workability evaluation of SIGMOD 2011 , 2011, SGMD.

[40]  Sriram Vishwanath,et al.  Optimal data attacks on power grids: Leveraging detection & measurement jamming , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[41]  Muhammad Ali Babar,et al.  Systematic reviews in software engineering: An empirical investigation , 2013, Inf. Softw. Technol..

[42]  Ashish Tiwari,et al.  Safety envelope for security , 2014, HiCoNS.

[43]  Lingzhi Zhu,et al.  Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control , 2018, IEEE Transactions on Industrial Informatics.

[44]  Henrik Sandberg,et al.  Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.

[45]  Xinyu Yang,et al.  On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.

[46]  Farrokh Aminifar,et al.  Cybersecurity in Distributed Power Systems , 2017, Proceedings of the IEEE.

[47]  Hyungbo Shim,et al.  Detection of Sensor Attack and Resilient State Estimation for Uniformly Observable Nonlinear Systems having Redundant Sensors , 2018, IEEE Transactions on Automatic Control.

[48]  M. Ribbens-Pavella,et al.  Bad Data Identification Methods In Power System State Estimation-A Comparative Study , 1985, IEEE Transactions on Power Apparatus and Systems.

[49]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[50]  Zuyi Li,et al.  Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.

[51]  Jinping Hao,et al.  Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[52]  Paulo Tabuada,et al.  Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[53]  Anthony Tzes,et al.  Covert attack on a discrete-time system with limited use of the available disruption resources , 2015, 2015 European Control Conference (ECC).

[54]  Weiyi Liu,et al.  Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems , 2014, J. Aerosp. Inf. Syst..

[55]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[56]  Claes Wohlin,et al.  Systematic literature studies: Database searches vs. backward snowballing , 2012, Proceedings of the 2012 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement.

[57]  Edmond Jonckheere,et al.  Statistical Structure Learning to Ensure Data Integrity in Smart Grid , 2015, IEEE Transactions on Smart Grid.

[58]  Jules White,et al.  Cyber-physical security challenges in manufacturing systems , 2014 .

[59]  Walid Saad,et al.  Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective , 2016, IEEE Transactions on Smart Grid.

[60]  Insup Lee,et al.  Attack-resilient minimum mean-squared error estimation , 2014, 2014 American Control Conference.

[61]  O. Dieste,et al.  Developing Search Strategies for Detecting Relevant Experiments for Systematic Reviews , 2007, First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007).

[62]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[63]  Zuyi Li,et al.  Trilevel Modeling of Cyber Attacks on Transmission Lines , 2017, IEEE Transactions on Smart Grid.

[64]  Yun Gu,et al.  Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids , 2014 .

[65]  John Lygeros,et al.  Cyber-Attacks in the Automatic Generation Control , 2015 .

[66]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.

[67]  J. Y. Keller,et al.  Monitoring of stealthy attack in networked control systems , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).

[68]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[69]  Zhu Han,et al.  Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.

[70]  Hyungbo Shim,et al.  On Redundant Observability: From Security Index to Attack Detection and Resilient State Estimation , 2018, IEEE Transactions on Automatic Control.

[71]  Lingkun Fu,et al.  DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[72]  Babu Narayanan,et al.  POWER SYSTEM STABILITY AND CONTROL , 2015 .

[73]  Paulo Tabuada,et al.  Secure state estimation and control using multiple (insecure) observers , 2014, 53rd IEEE Conference on Decision and Control.

[74]  Jacob Cohen,et al.  Weighted kappa: Nominal scale agreement provision for scaled disagreement or partial credit. , 1968 .

[75]  H. Ishii,et al.  Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation , 2015, IEEE Transactions on Power Systems.

[76]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[77]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[78]  Maria Domenica Di Benedetto,et al.  Further results on fault detection and isolation of malicious nodes in Multi-hop Control Networks , 2015, 2015 European Control Conference (ECC).

[79]  Hyungbo Shim,et al.  Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .

[80]  Nicanor Quijano,et al.  Integrity Attacks on Real-Time Pricing in Smart Grids: Impact and Countermeasures , 2017, IEEE Transactions on Smart Grid.

[81]  Chao Yang,et al.  Optimal Linear Attack on Cyber Physical Systems With Multiplicative Noise , 2018, IEEE Access.

[82]  Yongduan Song,et al.  Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries , 2018, Inf. Sci..

[83]  David K. Y. Yau,et al.  Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control , 2017, IEEE Transactions on Information Forensics and Security.

[84]  Edward A. Lee,et al.  Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .

[85]  Ling Shi,et al.  The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.

[86]  Tomohisa Hayakawa,et al.  Event-triggered control over unreliable networks subject to jamming attacks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[87]  Sridhar Adepu,et al.  An Investigation into the Response of a Water Treatment System to Cyber Attacks , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[88]  Song Tan,et al.  LPAttack: Leverage point attacks against state estimation in smart grid , 2014, 2014 IEEE Global Communications Conference.

[89]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[90]  Hongtao Sun,et al.  Security-based resilient event-triggered control of networked control systems under denial of service attacks , 2019, J. Frankl. Inst..

[91]  Deepa Kundur,et al.  A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.

[92]  Kai Petersen,et al.  Guidelines for conducting systematic mapping studies in software engineering: An update , 2015, Inf. Softw. Technol..

[93]  Takahiro Fujita,et al.  Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[94]  Karl Henrik Johansson,et al.  Voltage control for interconnected microgrids under adversarial actions , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).

[95]  Tao Jiang,et al.  Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications , 2018, IEEE Transactions on Smart Grid.

[96]  Quanyan Zhu,et al.  Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.

[97]  Osama A. Mohammed,et al.  A Survey on Smart Grid Cyber-Physical System Testbeds , 2017, IEEE Communications Surveys & Tutorials.

[98]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[99]  Kai Petersen,et al.  Evaluating strategies for study selection in systematic literature studies , 2014, ESEM '14.

[100]  Fuchun Sun,et al.  Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach , 2016, Int. J. Syst. Sci..

[101]  Carlos Murguia,et al.  Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[102]  Michail Maniatakos,et al.  Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.

[103]  Ling Shi,et al.  A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[104]  Ying Jun Zhang,et al.  Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation , 2014, IEEE Journal on Selected Areas in Communications.

[105]  Sam Malek,et al.  A Systematic Survey of Self-Protecting Software Systems , 2014, ACM Trans. Auton. Adapt. Syst..

[106]  Valentina Casola,et al.  A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices , 2013, IRI.

[107]  Lingfeng Wang,et al.  Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.

[108]  Zhu Han,et al.  Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.

[109]  Hyungbo Shim,et al.  Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach , 2015, 2015 European Control Conference (ECC).

[110]  Soummya Kar,et al.  Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.

[111]  Joe H. Chow,et al.  A toolbox for power system dynamics and control engineering education and research , 1992 .

[112]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[113]  Aditya Ashok,et al.  Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.

[114]  Walid Saad,et al.  Smart grid data injection attacks: To defend or not? , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[115]  Cheolhyeon Kwon,et al.  Hybrid robust controller design: Cyber attack attenuation for Cyber-Physical Systems , 2013, 52nd IEEE Conference on Decision and Control.

[116]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[117]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[118]  Paulo Tabuada,et al.  Event-triggered projected Luenberger observer for linear systems under sparse sensor attacks , 2014, 53rd IEEE Conference on Decision and Control.

[119]  Junjie Yan,et al.  To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots , 2015, ArXiv.

[120]  Jianhui Wang,et al.  Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.

[121]  Henrik Sandberg,et al.  Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.

[122]  Maria Domenica Di Benedetto,et al.  Optimal robust control and a separation principle for polytopic time-inhomogeneous Markov jump linear systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[123]  Éva Tardos,et al.  Algorithm design , 2005 .

[124]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[125]  Elwood S. Buffa,et al.  Graph Theory with Applications , 1977 .

[126]  Ling Shi,et al.  Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.

[127]  Pietro Tesi,et al.  Networked Control of Nonlinear Systems under Denial-of-Service , 2016 .

[128]  Mani Srivastava,et al.  PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks , 2015, CCS.

[129]  Tao Yue,et al.  Model-based security engineering for cyber-physical systems: A systematic mapping study , 2017, Inf. Softw. Technol..

[130]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[131]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[132]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[133]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[134]  Maria Domenica Di Benedetto,et al.  Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks , 2016, Autom..

[135]  Wei Ren,et al.  Stealthy attacks in power systems: Limitations on manipulating the estimation deviations caused by switching network topologies , 2014, 53rd IEEE Conference on Decision and Control.

[136]  Petros G. Voulgaris,et al.  Dual rate control for security in cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[137]  Deepa Kundur,et al.  A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis , 2016, IEEE Transactions on Smart Grid.

[138]  Henrik Sandberg,et al.  Survey and New Directions for Physics-Based Attack Detection in Control Systems , 2016 .

[139]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[140]  Deepa Kundur,et al.  Tuning out of phase: Resonance attacks , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[141]  Fuad E. Alsaadi,et al.  On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors , 2017, Neurocomputing.

[142]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[143]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[144]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[145]  Peng Deng,et al.  Cross-Layer Codesign for Secure Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[146]  Quanyan Zhu,et al.  Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.

[147]  Alie El-Din Mady,et al.  A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration , 2018, Proceedings of the IEEE.

[148]  Cesare Tinelli,et al.  Satisfiability Modulo Theories , 2021, Handbook of Satisfiability.

[149]  Bala Venkatesh,et al.  Optimal reconfiguration of radial distribution systems to maximize loadability , 2004 .

[150]  H. Vincent Poor,et al.  Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[151]  Xenofon D. Koutsoukos,et al.  Energy-based attack detection in networked control systems , 2014, HiCoNS.

[152]  Xinyu Yang,et al.  Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid , 2017, IEEE Internet of Things Journal.

[153]  T. Greenhalgh,et al.  Effectiveness and efficiency of search methods in systematic reviews of complex evidence: audit of primary sources , 2005, BMJ : British Medical Journal.

[154]  Giorgio Battistelli,et al.  Distributed Joint Attack Detection and Secure State Estimation , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[155]  Yang Liu,et al.  Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..

[156]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[157]  Yuancheng Li,et al.  State summation for detecting false data attack on smart grid , 2014 .

[158]  Zuyi Li,et al.  Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.

[159]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[160]  Osama A. Mohammed,et al.  Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit , 2017, NDSS.

[161]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[162]  Fangxing Li,et al.  Small test systems for power system economic studies , 2010, IEEE PES General Meeting.

[163]  Jin Dong,et al.  Finite energy and bounded attacks on control system sensor signals , 2014, 2014 American Control Conference.

[164]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[165]  Emanuele Garone,et al.  Secure dynamic state estimation via local estimators , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[166]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[167]  Norbert Wiener,et al.  Cybernetics. , 1948, Scientific American.

[168]  Nektarios Georgios Tsoutsos,et al.  Manufacturing and Security Challenges in 3D Printing , 2016 .

[169]  Karl Henrik Johansson,et al.  Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.

[170]  Soummya Kar,et al.  Information flow for security in control systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[171]  Jeanine Weekes Schroer,et al.  The Finite String Newsletter Abstracts of Current Literature Glisp User's Manual , 2022 .

[172]  Michael Kearns Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology , 2010 .

[173]  Zhu Han,et al.  Effect of stealthy bad data injection on network congestion in market based power system , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[174]  Quanyan Zhu,et al.  A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.

[175]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[176]  Hadis Karimipour,et al.  Robust Massively Parallel Dynamic State Estimation of Power Systems Against Cyber-Attack , 2018, IEEE Access.

[177]  Srivaths Ravi,et al.  Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..

[178]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[179]  Beibei Li,et al.  Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..

[180]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[181]  Karl Henrik Johansson,et al.  Distributed Sensor and Actuator Reconfiguration for Fault-Tolerant Networked Control Systems , 2018, IEEE Transactions on Control of Network Systems.

[182]  Insup Lee,et al.  Attack resilient state estimation for autonomous robotic systems , 2014, 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[183]  Karl Henrik Johansson,et al.  Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[184]  Edward A. Lee Computing Foundations and Practice for Cyber- Physical Systems: A Preliminary Report , 2007 .

[185]  Matt Bishop,et al.  The Art and Science of Computer Security , 2002 .

[186]  Bruno Sinopoli,et al.  Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.

[187]  Peter Rodgers,et al.  eulerAPE: Drawing Area-Proportional 3-Venn Diagrams Using Ellipses , 2014, PloS one.

[188]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.

[189]  Sonia Martínez,et al.  On Multi-Input Controllable Linear Systems Under Unknown Periodic DoS Jamming Attacks , 2013, SIAM Conf. on Control and its Applications.

[190]  Oliver Kosut,et al.  Cyber attacks on AC state estimation: Unobservability and physical consequences , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.

[191]  Ling Shi,et al.  Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.

[192]  Hamed Mohsenian Rad,et al.  Dynamic load altering attacks in smart grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[193]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[194]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[195]  Nikhil Chopra,et al.  On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).

[196]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[197]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[198]  Kris Tiri,et al.  Side-Channel Attack Pitfalls , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[199]  Daniela Chrenko,et al.  An efficient Intrusion Detection System against cyber-physical attacks in the smart grid , 2018, Comput. Electr. Eng..

[200]  Jennie Popay,et al.  Guidance on the conduct of narrative synthesis in systematic Reviews. A Product from the ESRC Methods Programme. Version 1 , 2006 .

[201]  Panganamala Ramana Kumar,et al.  Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[202]  Abdullah Abusorrah,et al.  Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.

[203]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[204]  Cheolhyeon Kwon,et al.  Analytical Analysis of Cyber Attacks on Unmanned Aerial Systems , 2013 .

[205]  Oliver Kosut,et al.  Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation , 2015, IEEE Transactions on Power Systems.

[206]  Nils Ole Tippenhauer,et al.  SWaT: a water treatment testbed for research and training on ICS security , 2016, 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater).

[207]  Paulo Tabuada,et al.  Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.

[208]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[209]  Jitesh H. Panchal,et al.  Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs , 2015, IEEE Transactions on Smart Grid.

[210]  Wei Yu,et al.  On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.

[211]  Daniela Cruzes,et al.  Research synthesis in software engineering: A tertiary study , 2011, Inf. Softw. Technol..

[212]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[213]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[214]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[215]  Dominique Sauter,et al.  Input reconstruction for networked control systems subject to deception attacks and data losses on control signals , 2016, Int. J. Syst. Sci..

[216]  Sriram Vishwanath,et al.  Optimal hidden SCADA attacks on power grid: A graph theoretic approach , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[217]  Fuad E. Alsaadi,et al.  Security‐guaranteed filtering for discrete‐time stochastic delayed systems with randomly occurring sensor saturations and deception attacks , 2017 .

[218]  Peter F. Al-Hokayem Stability Analysis of Networked Control Systems , 2003 .

[219]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[220]  Chao Lan,et al.  Anomaly Detection , 2018, Encyclopedia of GIS.

[221]  Kai Petersen,et al.  Systematic Mapping Studies in Software Engineering , 2008, EASE.

[222]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[223]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[224]  Maria Domenica Di Benedetto,et al.  Fault Tolerant Control of Multi-Hop Control Networks , 2013, IEEE Transactions on Automatic Control.

[225]  Le Xie,et al.  Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.

[226]  Karl Henrik Johansson,et al.  Efficient Computations of a Security Index for False Data Attacks in Power Networks , 2012, IEEE Transactions on Automatic Control.

[227]  Siddhartha Kumar Khaitan,et al.  Cyber Physical Systems Approach to Smart Electric Power Grid , 2015 .

[228]  George J. Pappas,et al.  State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.

[229]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[230]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[231]  Arman Sargolzaei,et al.  Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network , 2016 .

[232]  Walid Saad,et al.  Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.

[233]  W. P. M. H. Heemels,et al.  Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.

[234]  Danial Senejohnny,et al.  A Jamming-Resilient Algorithm for Self-Triggered Network Coordination , 2016, IEEE Transactions on Control of Network Systems.

[235]  Iman Shames,et al.  Secure and private control using semi-homomorphic encryption , 2017 .

[236]  Chunjie Zhou,et al.  Assessing the Physical Impact of Cyberattacks on Industrial Cyber-Physical Systems , 2018, IEEE Transactions on Industrial Electronics.

[237]  Jun Hu,et al.  On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks , 2016, Int. J. Gen. Syst..

[238]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[239]  Amir M. Tahmasebi,et al.  Experimental Identification and Analysis of the Dynamics of a PHANToM Premium 1.5A Haptic Device , 2008, PRESENCE: Teleoperators and Virtual Environments.

[240]  Joe H. Chow,et al.  Power System Dynamics and Stability: With Synchrophasor Measurement and Power System Toolbox 2e: With Synchrophasor Measurement and Power System Toolbox , 2017 .

[241]  Jeannette M. Wing,et al.  An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.

[242]  I. Lee,et al.  A Markovian Approach for Attack Resilient Control of Mobile Robotic Systems , 2015 .

[243]  Zuyi Li,et al.  False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.

[244]  Xiaodong Wang,et al.  Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.

[245]  Michel Verleysen,et al.  Nonlinear Dimensionality Reduction , 2021, Computer Vision.

[246]  Insup Lee,et al.  Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.

[247]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[248]  Ling Shi,et al.  Online Deception Attack against Remote State Estimation , 2014 .

[249]  Jing Huang,et al.  State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.

[250]  Ling Shi,et al.  Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..

[251]  Nirwan Ansari,et al.  CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.

[252]  Zhu Han,et al.  Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[253]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[254]  Lalitha Sankar,et al.  Implementation of unobservable state-preserving topology attacks , 2015, 2015 North American Power Symposium (NAPS).

[255]  Hamed Mohsenian-Rad,et al.  Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.

[256]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[257]  Rajnikant Sharma,et al.  Attack Mitigation in Adversarial Platooning Using Detection-Based Sliding Mode Control , 2015, CPS-SPC '15.

[258]  Ravishankar K. Iyer,et al.  Self-Healing Attack-Resilient PMU Network for Power System Operation , 2018, IEEE Transactions on Smart Grid.

[259]  Soummya Kar,et al.  Cyber-physical systems: Dynamic sensor attacks and strong observability , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[260]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[261]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[262]  T. Blumensath,et al.  Theory and Applications , 2011 .

[263]  Debapriya Das,et al.  Voltage Stability Analysis of Radial Distribution Networks , 2001 .

[264]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[265]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[266]  Keke Gai,et al.  Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks , 2017, IEEE Transactions on Smart Grid.

[267]  Yuan Xue,et al.  Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.

[268]  Siu-Ming Yiu,et al.  Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[269]  Deepa Kundur,et al.  A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.

[270]  Paulo Tabuada,et al.  Minimax control for cyber-physical systems under network packet scheduling attacks , 2013, HiCoNS '13.

[271]  P. Pardalos,et al.  Handbook of global optimization , 1995 .

[272]  Pearl Brereton,et al.  Lessons from applying the systematic literature review process within the software engineering domain , 2007, J. Syst. Softw..

[273]  Sandip Roy,et al.  Security concepts for the dynamics of autonomous vehicle networks , 2014, Autom..

[274]  Riccardo Muradore,et al.  A Formal Approach to Cyber-Physical Attacks , 2016, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).

[275]  Xiang Li,et al.  Rate alteration attacks in smart grid , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[276]  Igor Nikiforov,et al.  Sequential monitoring of SCADA systems against cyber/physical attacks , 2015 .

[277]  Paulo Tabuada,et al.  Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving , 2015, 2015 American Control Conference (ACC).

[278]  Dominique Sauter,et al.  Active GLR detector for resilient LQG controller in networked control systems , 2015 .

[279]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[280]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[281]  Lang Tong,et al.  Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.

[282]  Tamer Basar,et al.  One-stage control over an adversarial channel with finite codelength , 2011, IEEE Conference on Decision and Control and European Control Conference.

[283]  K. Narendra,et al.  Identification and Optimization of Aircraft Dynamics , 1973 .

[284]  Aditya Ashok,et al.  Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid , 2017, Proceedings of the IEEE.

[285]  Pietro Tesi,et al.  Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).

[286]  J. A. Bondy,et al.  Graph Theory with Applications , 1978 .

[287]  Junbo Zhao,et al.  Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.

[288]  Nicanor Quijano,et al.  Controllability of Dynamical Systems: Threat Models and Reactive Security , 2013, GameSec.

[289]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[290]  Wen-Long Chin,et al.  Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.

[291]  Karl Henrik Johansson,et al.  Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.

[292]  Alexander Egyed,et al.  A systematic mapping study of search-based software engineering for software product lines , 2015, Inf. Softw. Technol..

[293]  David K. Y. Yau,et al.  Integrity Attacks on Real-Time Pricing in Electric Power Grids , 2015, TSEC.

[294]  Katherine R. Davis,et al.  Power flow cyber attacks and perturbation-based defense , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[295]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[296]  Lianping Chen,et al.  Towards an Evidence-Based Understanding of Electronic Data Sources , 2010, EASE.

[297]  Vijay Gupta,et al.  Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..

[298]  Claes Wohlin,et al.  Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.

[299]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[300]  Zhihua Qu,et al.  Secure Power Systems Against Malicious Cyber-Physical Data Attacks: Protection and Identification , 2012 .

[301]  Insup Lee,et al.  Medical Cyber Physical Systems , 2010, Design Automation Conference.

[302]  Yassine Lakhnech,et al.  Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems , 2004, Lecture Notes in Computer Science.

[303]  Singiresu S. Rao Engineering Optimization : Theory and Practice , 2010 .

[304]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[305]  Paulo Tabuada,et al.  SMT-Based Observer Design for Cyber-Physical Systems under Sensor Attacks , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).

[306]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[307]  Teodor Sommestad,et al.  SCADA system cyber security — A comparison of standards , 2010, IEEE PES General Meeting.

[308]  Marilyn Wolf,et al.  False data injection attacks , 2019, Cloud Control Systems.

[309]  Calin Belta,et al.  Anomaly detection in cyber-physical systems: A formal methods approach , 2014, 53rd IEEE Conference on Decision and Control.

[310]  Zuyi Li,et al.  Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.

[311]  Quanyan Zhu,et al.  Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.

[312]  Pietro Tesi,et al.  Resilient Control under Denial-of-Service , 2013, ArXiv.

[313]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[314]  G. Manimaran,et al.  Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.

[315]  Shreyas Sundaram,et al.  The wireless control network: Monitoring for malicious behavior , 2010, 49th IEEE Conference on Decision and Control (CDC).

[316]  Ravishankar K. Iyer,et al.  Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.

[317]  Alberto Speranzon,et al.  On analysis and design of stealth-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[318]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[319]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[320]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[321]  Paulo Tabuada,et al.  Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).

[322]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[323]  Zahir Tari,et al.  Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..

[324]  Harshad Khadilkar,et al.  High Confidence Networked Control for Next Generation Air Transportation Systems , 2014, IEEE Transactions on Automatic Control.

[325]  Insup Lee,et al.  Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.

[326]  Tyrone L. Vincent,et al.  An abrupt change detection heuristic with applications to cyber data attacks on power systems , 2014, 2014 American Control Conference.

[327]  Dario Ambrosini,et al.  Data-driven model predictive control using random forests for building energy optimization and climate control , 2018, Applied Energy.

[328]  Karen A. Scarfone,et al.  Guide to Industrial Control Systems (ICS) Security , 2015 .

[329]  Hamed Mohsenian Rad,et al.  Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.

[330]  Mehul Motani,et al.  Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.

[331]  Douglas C. Schmidt,et al.  Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems , 2017, Int. J. Interact. Multim. Artif. Intell..

[332]  Ali Davoudi,et al.  Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids , 2017, IEEE Transactions on Industrial Informatics.

[333]  H. D. Rombach,et al.  The Goal Question Metric Approach , 1994 .

[334]  Tomohisa Hayakawa,et al.  Analysis of Stochastic Switched Systems With Application to Networked Control Under Jamming Attacks , 2017, IEEE Transactions on Automatic Control.

[335]  Peter W. Sauer,et al.  Power System Dynamics and Stability , 1997 .

[336]  Isao Ono,et al.  Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs , 2016, IEEE Transactions on Smart Grid.

[337]  Bruno Sinopoli,et al.  A moving target approach for identifying malicious sensors in control systems , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[338]  Karin Sallhammar,et al.  Stochastic Models for Combined Security and Dependability Evaluation , 2007 .

[339]  Lalitha Sankar,et al.  Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.

[340]  Ling Shi,et al.  Fake-acknowledgment attack on ACK-based sensor power schedule for remote state estimation , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[341]  Kevin Fu,et al.  Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[342]  Allen J. Wood,et al.  Power Generation, Operation, and Control , 1984 .

[343]  Gang Tao,et al.  A novel nonlinear resilient control for a quadrotor UAV via backstepping control and nonlinear disturbance observer , 2016, Nonlinear Dynamics.

[344]  N. Lawrence Ricker,et al.  Model predictive control of a continuous, nonlinear, two-phase reactor , 1993 .

[345]  Peter Xiaoping Liu,et al.  A stochastic game approach to the security issue of networked control systems under jamming attacks , 2014, J. Frankl. Inst..

[346]  Yilin Mo,et al.  Security in cyber-physical systems: Controller design against Known-Plaintext Attack , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[347]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[348]  György Dán,et al.  Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.

[349]  Ling Shi,et al.  Event-based attack against remote state estimation , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[350]  G. Manimaran,et al.  Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[351]  Yilin Mo,et al.  Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.

[352]  Zuyi Li,et al.  Transmission Line Rating Attack in Two-Settlement Electricity Markets , 2016, IEEE Transactions on Smart Grid.

[353]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[354]  Ruggero Carli,et al.  A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[355]  Lang Tong,et al.  Dynamic attacks on power systems economic dispatch , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.

[356]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[357]  Ying Jun Zhang,et al.  False-data injection attack to control real-time price in electricity market , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[358]  Karl Henrik Johansson,et al.  The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..

[359]  Mihalis Yannakakis,et al.  Joint Cyber and Physical Attacks on Power Grids: Graph Theoretical Approaches for Information Recovery , 2015, SIGMETRICS 2015.

[360]  Michail Maniatakos,et al.  The Cybersecurity Landscape in Industrial Control Systems , 2016, Proceedings of the IEEE.

[361]  Qun Li,et al.  Defending against Unidentifiable Attacks in Electric Power Grids , 2013, IEEE Transactions on Parallel and Distributed Systems.

[362]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[363]  Zidong Wang,et al.  Event-based security control for discrete-time stochastic systems , 2016 .

[364]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[365]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[366]  R. K. Ro D G E R S A N D A N G E L A S Ow D E N,et al.  Testing Methodological Guidance on the Conduct of Narrative Synthesis in Systematic Reviews Effectiveness of Interventions to Promote Smoke Alarm Ownership and Function , 2008 .

[367]  Juan E. Tapiador,et al.  Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.

[368]  H. Vincent Poor,et al.  Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[369]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[370]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[371]  Flemming Nielson,et al.  Denial-of-Service Security Attack in the Continuous-Time World , 2014, FORTE.

[372]  Amr M. Youssef,et al.  Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.

[373]  Riccardo Muradore,et al.  Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.

[374]  Hao Liang,et al.  CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.

[375]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[376]  Paulo Tabuada,et al.  Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[377]  Colleen Swanson,et al.  SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks , 2014, 2014 IEEE Symposium on Security and Privacy.

[378]  Rong Zheng,et al.  Stealth false data injection using independent component analysis in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[379]  Muhammad Ali Babar,et al.  Identifying relevant studies in software engineering , 2011, Inf. Softw. Technol..

[380]  William S. Levine,et al.  The Control Handbook , 2005 .

[381]  Tong Heng Lee,et al.  Design and implementation of a robust and nonlinear flight control system for an unmanned helicopter , 2011 .

[382]  Radha Poovendran,et al.  Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.

[383]  Shuai Liu,et al.  Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks , 2016, Neurocomputing.

[384]  Deepa Kundur,et al.  A resilient feedback linearization control scheme for smart grids under cyber-physical disturbances , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[385]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[386]  Deepa Kundur,et al.  Biologically Inspired Hierarchical Cyber-Physical Multi-agent Distributed Control Framework for Sustainable Smart Grids , 2015 .

[387]  Guoxiang Gu,et al.  Secure networked control systems against replay attacks without injecting authentication noise , 2015, 2015 American Control Conference (ACC).

[388]  Henry Muccini,et al.  A Study on MDE Approaches for Engineering Wireless Sensor Networks , 2014, 2014 40th EUROMICRO Conference on Software Engineering and Advanced Applications.

[389]  Dejan Nickovic,et al.  Monitoring Temporal Properties of Continuous Signals , 2004, FORMATS/FTRTFT.

[390]  Derui Ding,et al.  Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..

[391]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[392]  Zuyi Li,et al.  Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.

[393]  Ehab Al-Shaer,et al.  Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.

[394]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[395]  Zhu Han,et al.  Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.

[396]  H. Vincent Poor,et al.  Maximum Distortion Attacks in Electricity Grids , 2016, IEEE Transactions on Smart Grid.

[397]  Changyun Wen,et al.  Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .

[398]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.