Security analysis of cyber-physical systems using H 2 norm
暂无分享,去创建一个
[1] R. Nikoukhah,et al. A mixed I approach to simultaneous fault detection and control , 2004, Autom..
[2] Yun Zhang,et al. On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types , 2013, BMC Bioinformatics.
[3] Milind Dawande,et al. On Bipartite and Multipartite Clique Problems , 2001, J. Algorithms.
[4] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[5] Juan Pablo Vielma,et al. An integer linear programming approach for bilinear integer programming , 2012, Oper. Res. Lett..
[6] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[7] Karl Henrik Johansson,et al. Quantifying Cyber-Security for Networked Control Systems , 2013, CPSW@CISS.
[8] Sai Pushpak,et al. Vulnerability analysis of large-scale dynamical networks to coordinated attacks , 2014, 2014 4th Australian Control Conference (AUCC).
[9] René Peeters,et al. The maximum edge biclique problem is NP-complete , 2003, Discret. Appl. Math..
[10] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[11] Karl Henrik Johansson,et al. Efficient Computations of a Security Index for False Data Attacks in Power Networks , 2012, IEEE Transactions on Automatic Control.
[12] Babu Narayanan,et al. POWER SYSTEM STABILITY AND CONTROL , 2015 .
[13] T. Summers,et al. Security Analysis of Networked Systems in the Presence of Impulsive Attacks , 2014 .
[14] Florian Dörfler,et al. Kron Reduction of Graphs With Applications to Electrical Networks , 2011, IEEE Transactions on Circuits and Systems I: Regular Papers.
[15] Manfred W. Padberg,et al. The boolean quadric polytope: Some characteristics, facets and relatives , 1989, Math. Program..
[16] Andras Varga. Integrated algorithm for solving H2-optimal fault detection and isolation problems , 2010, 2010 Conference on Control and Fault-Tolerant Systems (SysTol).
[17] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[18] Toshimde Ibaraki. Integer programming formulation of combinatorial optimization problems , 1976, Discret. Math..