Performance degradation of stealthy attacks against sensor measurements in vector systems
暂无分享,去创建一个
[1] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[2] Tongwen Chen,et al. Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[3] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[4] Xingshe Zhou,et al. Intelligent CPS: features and challenges , 2016, Science China Information Sciences.
[5] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[6] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[7] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[8] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] Ruochi Zhang,et al. Stealthy control signal attacks in scalar LQG systems , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[10] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[11] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[12] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[13] Jian Sun,et al. Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.
[14] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[15] Ling Shi,et al. Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.
[16] Bruno Sinopoli,et al. A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems , 2017, 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] Jian Sun,et al. Fasle data injection attacks in cyber-physical systems based on inaccurate model , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[18] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[19] Zhong-Ping Jiang,et al. A junction-by-junction feedback-based strategy with convergence analysis for dynamic traffic assignment , 2015, Science China Information Sciences.
[20] Lihua Xie,et al. Resilience and Performance Analysis for State Estimation against Integrity Attacks , 2016 .
[21] Ling Shi,et al. The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.
[22] Zuowen Tan. A new threshold authenticated encryption scheme using labor-division signature , 2010, J. Syst. Sci. Complex..
[23] Jie Chen,et al. A survey on the security of cyber-physical systems , 2016 .
[24] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[25] I. D. Coope,et al. On Matrix Trace Inequalities and Related Topics for Products of Hermitian Matrices , 1994 .
[26] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[27] Donghua Zhou,et al. Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.