Security Analysis of a Distributed Networked System Under Eavesdropping Attacks
暂无分享,去创建一个
Guanrong Chen | Xiaofan Wang | Wen Yang | Ziqian Zheng | Yang Tang | Guanrong Chen | Xiaofan Wang | Yang Tang | W. Yang | Ziqian Zheng
[1] Florian Dörfler,et al. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[2] Vincent Y. F. Tan,et al. A Numerical Study on the Wiretap Network With a Simple Network Topology , 2016, IEEE Transactions on Information Theory.
[3] Tong Zhou,et al. On the controllability and observability of networked dynamic systems , 2014, Autom..
[4] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[5] Adesh Kumar,et al. Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control , 2017 .
[6] Li-Chun Wang,et al. Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems , 2016, IEEE Transactions on Parallel and Distributed Systems.
[7] Chao Yang,et al. Nodes selection strategy in cooperative tracking problem , 2016, Autom..
[8] Hao Wang,et al. On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks † , 2016, Sensors.
[9] Mehran Mesbahi,et al. Controllability and Observability of Network-of-Networks via Cartesian Products , 2014, IEEE Transactions on Automatic Control.
[10] Reza Azarderakhsh,et al. Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures , 2014, IEEE Transactions on Circuits and Systems II: Express Briefs.
[11] Andre Teixeira,et al. Toward Cyber-Secure and Resilient Networked Control Systems , 2014 .
[12] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[13] Guo-Ping Jiang,et al. Reference-Modulated DCSK: A Novel Chaotic Communication Scheme , 2013, IEEE Transactions on Circuits and Systems II: Express Briefs.
[14] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[15] Yu Wang,et al. Controllability and observability analysis for vertex domination centrality in directed networks , 2014, Scientific reports.
[16] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[17] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[18] Tongwen Chen,et al. An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[19] Chao Yang,et al. Event-based distributed state estimation under deception attack , 2017, Neurocomputing.
[20] Ching-tai Lin. Structural controllability , 1974 .
[21] M.L.J. Hautus,et al. Controllability and observability conditions of linear autonomous systems , 1969 .
[22] Sana Hoor Jokhio,et al. Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[23] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.