Detection of stealthy false data injection attacks against networked control systems via active data modification
暂无分享,去创建一个
Kun Liu | Jian Sun | Guo-Ping Liu | Zhong-Hua Pang | Lan-Zhi Fan | Jian Sun | Guoping Liu | Kun Liu | Zhong-Hua Pang | Lan-Zhi Fan
[1] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[2] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[3] Emilia Fridman,et al. Survey on time-delay approach to networked control , 2019, Annu. Rev. Control..
[4] Qing-Long Han,et al. Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks , 2019, IEEE Transactions on Cybernetics.
[5] Dan Ye,et al. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems , 2020, IEEE Transactions on Cybernetics.
[6] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[7] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[9] Donghua Zhou,et al. Data-Based Predictive Control for Networked Nonlinear Systems With Network-Induced Delay and Packet Dropout , 2016, IEEE Transactions on Industrial Electronics.
[10] Alie El-Din Mady,et al. A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration , 2018, Proceedings of the IEEE.
[11] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[12] Qing-Long Han,et al. Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..
[13] Qing-Long Han,et al. A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.
[14] Guang-Hong Yang,et al. Optimal stealthy false data injection attacks in cyber-physical systems , 2019, Inf. Sci..
[15] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[16] Qing-Long Han,et al. Networked control systems: a survey of trends and techniques , 2020, IEEE/CAA Journal of Automatica Sinica.
[17] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[18] Wei Xing Zheng,et al. Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.
[19] Qing-Long Han,et al. Network-Based Modeling and Proportional–Integral Control for Direct-Drive-Wheel Systems in Wireless Network Environments , 2020, IEEE Transactions on Cybernetics.
[20] Qing-Long Han,et al. Observer-Based Incremental Predictive Control of Networked Multi-Agent Systems With Random Delays and Packet Dropouts , 2020, IEEE Transactions on Circuits and Systems II: Express Briefs.
[21] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[22] Guoqiang Hu,et al. Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks , 2020, IEEE Transactions on Control Systems Technology.
[23] Hongtao Sun,et al. A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[24] Qing-Long Han,et al. Distributed Event-Triggered Estimation Over Sensor Networks: A Survey , 2020, IEEE Transactions on Cybernetics.
[25] Ling Shi,et al. Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.
[26] Riccardo Muradore,et al. Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.
[27] Ling Shi,et al. The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.
[28] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[29] Yongqiang Wang,et al. Secure and Privacy-Preserving Consensus , 2017, IEEE Transactions on Automatic Control.
[30] Qing-Long Han,et al. Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.
[31] Warren E. Dixon,et al. Detection and Mitigation of False Data Injection Attacks in Networked Control Systems , 2020, IEEE Transactions on Industrial Informatics.
[32] Panos J. Antsaklis,et al. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.
[33] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[34] Ribhu Chopra,et al. Statistical Tests for Detecting Granger Causality , 2018, IEEE Transactions on Signal Processing.
[35] Donghua Zhou,et al. Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.
[36] Daniel Liberzon,et al. Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.
[37] An-Yang Lu,et al. False data injection attacks against state estimation in the presence of sensor failures , 2020, Inf. Sci..