Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems
暂无分享,去创建一个
[1] Kurt Johannes Reinschke,et al. Multivariable Control a Graph-theoretic Approach , 1988 .
[2] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[3] Frank L. Lewis,et al. A tutorial on the geometric analysis of linear time-invariant implicit systems , 1992, Autom..
[4] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[5] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[6] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[7] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[8] W. Wonham. Linear Multivariable Control: A Geometric Approach , 1974 .
[9] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[10] P. Daoutidis,et al. Control of nonlinear differential algebraic equation systems , 1999 .
[11] G. Basile,et al. Controlled and conditioned invariants in linear system theory , 1992 .
[12] Juan Pablo Conti,et al. The day the samba stopped , 2010 .
[13] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[14] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.
[15] Jovan Ilic,et al. Frequency Instability Problems in North American Interconnections , 2011 .
[16] Ernst Scholtz,et al. Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems , 2004 .
[17] Florian Dörfler,et al. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[18] Christian Commault,et al. Generic properties and control of linear structured systems: a survey , 2003, Autom..
[19] C. L. DeMarco,et al. The potential for malicious control in a competitive power systems environment , 1996, Proceeding of the 1996 IEEE International Conference on Control Applications IEEE International Conference on Control Applications held together with IEEE International Symposium on Intelligent Contro.
[20] Xavier Litrico,et al. Modeling and Control of Hydrosystems , 2009 .
[21] Florian Dörfler,et al. Continuous-Time Distributed Observers With Discrete Communication , 2013, IEEE Journal of Selected Topics in Signal Processing.
[22] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[23] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[24] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[25] Alberto Speranzon,et al. On analysis and design of stealth-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[26] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[27] Sonia Martínez,et al. On Distributed Convex Optimization Under Inequality and Equality Constraints , 2010, IEEE Transactions on Automatic Control.
[28] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[29] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[30] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[31] Paulo Tabuada,et al. Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[32] Guy Richards. Hackers vs slackers - [control security] , 2008 .
[33] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[34] F. Bullo,et al. A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.
[35] Ton Geerts. Invariant subspaces and invertibility properties for singular systems: The general case , 1993 .
[36] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[37] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[38] Andrzej J. Osiadacz Osiadacz,et al. Simulation and Analysis of Gas Networks , 1987 .
[39] P. Daoutidis,et al. Feedback control of nonlinear differential-algebraic-equation systems , 1995 .
[40] Harry L. Trentelman,et al. Control theory for linear systems , 2002 .
[41] Donald A. Pierre,et al. An application of Prony methods in PSS design for multimachine systems , 1991 .
[42] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[43] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[44] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[45] A. Willsky,et al. Failure detection and identification , 1989 .
[46] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[47] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[48] J. Y. Keller,et al. Monitoring of stealthy attack in networked control systems , 2013, 2013 Conference on Control and Fault-Tolerant Systems (SysTol).
[49] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[50] Robert Axelrod,et al. Timing of cyber conflict , 2014, Proceedings of the National Academy of Sciences.
[51] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[52] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[53] Marios M. Polycarpou,et al. A Fault Diagnosis and Security Framework for Water Systems , 2010, IEEE Transactions on Control Systems Technology.
[54] Marc C. Steinbach,et al. Optimization models for operative planning in drinking water networks , 2009 .
[55] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).