Detection for Controller-to-Actuator Replay Attack in Cyber-Physical Systems via Pseudo-Random Code
暂无分享,去创建一个
Dan Ye | Tian-Yu Zhang | Yue Long | Y. Long | Tian-Yu Zhang | Dan Ye
[1] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[3] W. Marsden. I and J , 2012 .
[4] Guang-Hong Yang,et al. Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.
[5] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[6] Dan Ye,et al. A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..
[7] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[8] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[9] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[10] Guang-Hong Yang,et al. Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service , 2018, IEEE Transactions on Automatic Control.
[11] Guang-Hong Yang,et al. Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks , 2019, IEEE Transactions on Cybernetics.
[12] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[13] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[14] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[15] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[16] João Pedro Hespanha,et al. Linear Systems Theory , 2009 .
[17] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[18] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[19] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.