Cyber attack mitigation for cyber–physical systems: hybrid system approach to controller design
暂无分享,去创建一个
[1] Inseok Hwang,et al. Robust estimation and fault detection and isolation algorithms for stochastic linear hybrid systems with unknown fault input , 2011 .
[2] T. Başar. A dynamic games approach to controller design: disturbance rejection in discrete-time , 1991 .
[3] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[4] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[5] João Pedro Hespanha,et al. Switching between stabilizing controllers , 2002, Autom..
[6] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[7] Anand R. Tripathi,et al. Security Policies in Distributed CSCW and Workflow Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[8] Manfred Morari,et al. Model predictive control: Theory and practice - A survey , 1989, Autom..
[9] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[10] João Pedro Hespanha,et al. Uniform stability of switched linear systems: extensions of LaSalle's Invariance Principle , 2004, IEEE Transactions on Automatic Control.
[11] K. Narendra,et al. Identification and Optimization of Aircraft Dynamics , 1973 .
[12] Virgil D. Gligor. A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.
[13] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[14] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[15] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[16] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[17] Inseok Hwang,et al. Stochastic Linear Hybrid Systems: Modeling, Estimation, and Application in Air Traffic Control , 2009, IEEE Transactions on Control Systems Technology.
[18] Mark E. Campbell,et al. Robust Nonlinear Model Predictive Control With Partial State Information , 2008, IEEE Transactions on Control Systems Technology.