Analysis and Design of Stealthy Cyber Attacks on Unmanned Aerial Systems
暂无分享,去创建一个
[1] Stephen P. Boyd,et al. Convex Optimization: Duality , 2004 .
[2] Zdobysław Goraj,et al. Security analysis of uav radio communication system , 2009 .
[3] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[4] Yahya Chetouani. Using the Kalman Filtering for the Fault Detection and Isolation (FDI) in the Nonlinear Dynamic Processes , 2008 .
[5] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[6] Steven X. Ding,et al. Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .
[7] Jason L. Speyer,et al. A generalized Shiryayev sequential probability ratio test for change detection and isolation , 1999, IEEE Trans. Autom. Control..
[8] Igor V. Nikiforov,et al. A generalized change detection problem , 1995, IEEE Trans. Inf. Theory.
[9] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[10] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[11] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[12] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[13] Thia Kirubarajan,et al. Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .
[14] David Titterton,et al. Integrated navigation systems , 2004 .
[15] Virgil D. Gligor. A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.
[16] John Weston,et al. Strapdown Inertial Navigation Technology , 1997 .
[17] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[18] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[19] Weiyi Liu,et al. Numerical Analysis of Cyberattacks on Unmanned Aerial Systems , 2012, Infotech@Aerospace.
[20] J.J. Gertler,et al. Survey of model-based failure detection and isolation in complex plants , 1988, IEEE Control Systems Magazine.
[21] Inseok Hwang,et al. Stochastic Linear Hybrid Systems: Modeling, Estimation, and Application in Air Traffic Control , 2009, IEEE Transactions on Control Systems Technology.
[22] Stanley R. Herwitz,et al. UAV Homeland Security Demonstration , 2004 .
[23] Anand R. Tripathi,et al. Security Policies in Distributed CSCW and Workflow Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[24] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[25] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[26] Inseok Hwang,et al. Distributed Multitarget Tracking and Identity Management , 2008 .
[27] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[28] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[29] Weiyi Liu,et al. Software/Hardware-in-the-Loop Analysis of Cyberattacks on Unmanned Aerial Systems , 2014, J. Aerosp. Inf. Syst..
[30] Josef Shinar,et al. Novel Adaptive Generalized Likelihood Ratio Detector with Application to Maneuvering Target Tracking , 2006 .
[31] Cheolhyeon Kwon,et al. Real-Time Safety Assessment of Unmanned Aircraft Systems Against Stealthy Cyber Attacks , 2016, J. Aerosp. Inf. Syst..
[32] John Weston,et al. Strapdown Inertial Navigation Technology, Second Edition , 2005 .
[33] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[34] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[35] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[36] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.