Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure
暂无分享,去创建一个
[1] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[2] Vicenç Puig,et al. MIMO Smith predictor: Global and structured robust performance analysis , 2009 .
[3] Jianguo Zhou,et al. Global speed control of separately excited DC motor , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).
[4] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[5] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[6] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[7] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[8] Karl Henrik Johansson,et al. Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.
[9] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[10] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[11] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[12] S. Bolognani,et al. Design of a flux weakening control scheme for DC motor drives featuring full voltage operation , 2008, 2008 43rd International Universities Power Engineering Conference.
[13] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.