Bio-inspired System Identification Attacks in Noisy Networked Control Systems
暂无分享,去创建一个
[1] Pinar Çivicioglu,et al. Backtracking Search Optimization Algorithm for numerical optimization problems , 2013, Appl. Math. Comput..
[2] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[3] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[4] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[5] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[6] Raphael Machado,et al. A controller design for mitigation of passive system identification attacks in networked control systems , 2017, Journal of Internet Services and Applications.
[7] Emiliano Sisinni,et al. Improving simulation of wireless networked control systems based on WirelessHART , 2013, Comput. Stand. Interfaces.
[8] Sameer Qazi,et al. Cyber Security Backdrop: A SCADA testbed , 2014, 2014 IEEE Computers, Communications and IT Applications Conference.
[9] Kun Ji,et al. Resilient control for wireless networked control systems , 2011 .
[10] Raphael Machado,et al. Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[11] Alan Oliveira de Sá,et al. Bio-inspired Active System Identification: a Cyber-Physical Intelligence Attack in Networked Control Systems , 2020, Mob. Networks Appl..
[12] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[13] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[14] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..