Secure Control: Towards Survivable Cyber-Physical Systems
暂无分享,去创建一个
[1] T. Potok,et al. CRITICAL ENERGY INFRASTRUCTURE SURVIVABILITY , INHERENT LIMITATIONS , 2004 .
[2] Ya-Chin Chang,et al. A SCADA system reliability evaluation considering performance requirement , 2004, 2004 International Conference on Power System Technology, 2004. PowerCon 2004..
[3] Leonard M. Adleman,et al. An Abstract Theory of Computer Viruses , 1988, CRYPTO.
[4] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[5] George Scalise,et al. Leadership Under Challenge: Information Technology R&D in a Competitive World. An Assessment of the Federal Networking and Information Technology R&D Program , 2007 .
[6] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[7] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[8] Gianfranco Ciardo,et al. SMART: the stochastic model checking analyzer for reliability and timing , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..
[9] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[10] Robert J. Turk. Cyber Incidents Involving Control Systems , 2005 .
[11] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[12] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[13] Virgil D. Gligor. A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.
[14] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[15] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[16] Bruce Schneier,et al. Managed Security Monitoring: Network Security for the 21st Centur , 2001, Comput. Secur..
[17] Panos J. Antsaklis,et al. Supervisory Control of Concurrent Systems: A Petri Net Structural Approach (M.V. Iordache and P.J. Antsaklis; 2008) [Book reviews] , 2006, IEEE Transactions on Automatic Control.
[18] J. Knight,et al. ON THE DEFINITION OF SURVIVABILITY , 2000 .
[19] Adrian Perrig,et al. Don't Sweat Your Privacy Using Humidity to Detect Human Presence , 2007 .
[20] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[21] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[22] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Sensor Networks , 2006, 2006 Securecomm and Workshops.
[23] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[24] Adrian Perrig,et al. Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.
[25] Ian R. Petersen,et al. Robust Kalman Filtering for Signals and Systems with Large Uncertainties , 1999 .
[26] Hongnian Yu,et al. Petri net-based closed-loop control and on-line scheduling of the batch process plant , 1998 .
[27] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[28] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[29] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[30] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[31] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[32] R. Olfati-Saber,et al. Distributed Kalman Filter with Embedded Consensus Filters , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[33] Boudewijn R. Haverkort. Performance of computer communication systems , 1998 .
[34] Vincent D. Blondel,et al. Fault tolerant control: a simultaneous stabilization result , 2004, IEEE Transactions on Automatic Control.
[35] John McHugh,et al. Survivable Network Analysis Method , 2000 .
[36] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[37] Boudewijn R. Haverkort,et al. Model checking for survivability! , 2005, Second International Conference on the Quantitative Evaluation of Systems (QEST'05).
[38] Michel Kinnaert,et al. Diagnosis and Fault-Tolerant Control , 2004, IEEE Transactions on Automatic Control.
[39] M. Luk,et al. MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.
[40] H. Vincent. On Minimax Robustness: A General Approach and Applications , 1984 .
[41] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.