Worst-case analysis of innovation-based linear attack on remote state estimation with resource constraint
暂无分享,去创建一个
Ling Shi | Karl Henrik Johansson | Dawei Shi | Ziyang Guo | K. Johansson | Ling Shi | Dawei Shi | Ziyang Guo
[1] R. K. Mehra,et al. Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .
[2] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[3] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[4] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[5] Robert J. Elliott,et al. On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[6] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[7] Sandeep K. S. Gupta,et al. Special Issue on Cyber-Physical Systems [Scanning the Issue] , 2012, Proc. IEEE.
[8] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[9] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[10] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[11] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[13] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[14] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[15] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[16] Mohamed Darouach,et al. Event-based state estimation of linear dynamic systems with unknown exogenous inputs , 2016, Autom..
[17] Karl Henrik Johansson,et al. Optimal power flow: Closing the loop over corrupted data , 2012, 2012 American Control Conference (ACC).
[18] Lang Tong,et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.
[19] Sinem Coleri Ergen,et al. ZigBee/IEEE 802.15.4 Summary , 2004 .