Toward Cyber-Secure and Resilient Networked Control Systems
暂无分享,去创建一个
[1] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[2] Marcel Staroswiecki. Fault tolerant control : The pseudo-inverse method revisited , 2005 .
[3] K. J. Szalai,et al. Multi-flight Computer Redundancy Management For Digital Fly-by-wire Aircraft Control , 1977 .
[4] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[5] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[6] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[7] Long Cheng,et al. Decentralized Robust Adaptive Control for the Multiagent System Consensus Problem Using Neural Networks , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[8] Roberto Uribeetxeberria,et al. A Review of SCADA Anomaly Detection Systems , 2011, SOCO.
[9] T. Basar,et al. H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..
[10] Panos J. Antsaklis,et al. Control and Communication Challenges in Networked Real-Time Systems , 2007, Proceedings of the IEEE.
[11] Tariq Samad,et al. System architecture for process automation: Review and trends , 2007 .
[12] Karl Henrik Johansson,et al. Design of State-Based Schedulers for a Network of Control Loops , 2012, IEEE Transactions on Automatic Control.
[13] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[14] Xiaofeng Wang,et al. Event-Triggering in Distributed Networked Control Systems , 2011, IEEE Transactions on Automatic Control.
[15] Alessandro Vespignani,et al. Dynamical Processes on Complex Networks , 2008 .
[16] G. Basile,et al. Controlled and conditioned invariants in linear system theory , 1992 .
[17] Jan Lunze,et al. Feedback control of large-scale systems , 1992 .
[18] L. Tong,et al. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[19] P. Kundur. Power System Stability , 2012 .
[20] David I. Gertman,et al. Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.
[21] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[22] Wei Zhang,et al. Stability of networked control systems , 2001 .
[23] Karl Johan Åström,et al. Control: A perspective , 2014, Autom..
[24] Jason L. Speyer,et al. Robust fault detection filter design , 1995, Proceedings of 1995 American Control Conference - ACC'95.
[25] Remus Teodorescu,et al. Special tests for the power electronic converters of wind turbine generators , 2011, 2011 IEEE Power and Energy Society General Meeting.
[26] Giorgio Battistelli,et al. Model-free Adaptive Switching Control of Uncertain Time-Varying Plants , 2011 .
[27] Robert R. Moeller,et al. Risk Management Fundamentals , 2011 .
[28] John Lygeros,et al. Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.
[29] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[30] Dragoslav D. Šiljak,et al. Decentralized control of complex systems , 2012 .
[31] Marcel Staroswiecki,et al. Progressive accommodation of parametric faults in linear quadratic control , 2007, Autom..
[32] Ronald L. Krutz. Securing SCADA systems , 2005 .
[33] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[34] Steven X. Ding,et al. Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .
[35] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[36] Henrik Sandberg,et al. The VIKING project: An initiative on resilient control of power networks , 2009, 2009 2nd International Symposium on Resilient Control Systems.
[37] Jan Lunze,et al. Reconfigurable Fault-tolerant Control: A Tutorial Introduction , 2008, Eur. J. Control.
[38] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[39] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[40] Petros G. Voulgaris,et al. Failure-robust distributed controller architectures , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[41] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[42] Behrouz Touri,et al. Consensus in the Presence of an Adversary , 2012 .
[43] Cédric Langbort,et al. Distributed control design for systems interconnected over an arbitrary graph , 2004, IEEE Transactions on Automatic Control.
[44] Karl Henrik Johansson,et al. The quadruple-tank process: a multivariable laboratory process with an adjustable zero , 2000, IEEE Trans. Control. Syst. Technol..
[45] Quanyan Zhu,et al. A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.
[46] Shreyas Sundaram,et al. A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks , 2012, Autom..
[47] Inseok Yang,et al. Fault-tolerant control strategy based on control allocation using smart actuators , 2010, 2010 Conference on Control and Fault-Tolerant Systems (SysTol).
[48] Wei Xing Zheng,et al. Coordination of Multiple Agents With Double-Integrator Dynamics Under Generalized Interaction Topologies , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[49] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[50] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[51] Asuman E. Ozdaglar,et al. Constrained Consensus and Optimization in Multi-Agent Networks , 2008, IEEE Transactions on Automatic Control.
[52] Rafael Castro-Linares,et al. Trajectory tracking for non-holonomic cars: A linear approach to controlled leader-follower formation , 2010, 49th IEEE Conference on Decision and Control (CDC).
[53] Karl Henrik Johansson,et al. On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem , 2011, IEEE Transactions on Smart Grid.
[54] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[55] G. Zames. Feedback and optimal sensitivity: Model reference transformations, multiplicative seminorms, and approximate inverses , 1981 .
[56] Karl Henrik Johansson,et al. Optimal power flow: Closing the loop over corrupted data , 2012, 2012 American Control Conference (ACC).
[57] A. Willsky,et al. Analytical redundancy and the design of robust failure detection systems , 1984 .
[58] Björn Johansson,et al. On Distributed Optimization in Networked Systems , 2008 .
[59] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[60] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[61] Antonio Bicchi,et al. Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.
[62] R. J. Patton,et al. Fault detection, supervision, and safety for technical processes 1997 (SAFEPROCESS '97) : a proceedings volume from the 3rd IFAC symposium, Kingston Upon Hull, UK, 26-28 August 1997 , 1998 .
[63] Marc E. Pfetsch,et al. The Computational Complexity of the Restricted Isometry Property, the Nullspace Property, and Related Concepts in Compressed Sensing , 2012, IEEE Transactions on Information Theory.
[64] Luca Schenato,et al. To Zero or to Hold Control Inputs With Lossy Links? , 2009, IEEE Transactions on Automatic Control.
[65] Tor Arne Johansen,et al. Control allocation - A survey , 2013, Autom..
[66] Suresh M. Joshi,et al. An adaptive control scheme for systems with unknown actuator failures , 2002, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).
[67] N. Eva Wu,et al. Control reconfigurability of linear time-invariant systems , 2000, Autom..
[68] Naomi Ehrich Leonard,et al. Dynamics of Decision Making in Animal Group Motion , 2009, J. Nonlinear Sci..
[69] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[70] Ilya V. Kolmanovsky,et al. Predictive energy management of a power-split hybrid electric vehicle , 2009, 2009 American Control Conference.
[71] Marios M. Polycarpou,et al. A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems , 2002, IEEE Trans. Autom. Control..
[72] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[73] Richard M. Murray,et al. Optimal LQG control across packet-dropping links , 2007, Syst. Control. Lett..
[74] A. Monticelli. State estimation in electric power systems : a generalized approach , 1999 .
[75] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[76] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[77] W. H. Chung,et al. A game theoretic fault detection filter , 1998, IEEE Trans. Autom. Control..
[78] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[79] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[80] Mohammad Shahidehpour,et al. Impact of Security on Power Systems Operation , 2005, Proceedings of the IEEE.
[81] Stephen P. Boyd,et al. Linear Matrix Inequalities in Systems and Control Theory , 1994 .
[82] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[83] Guang-Hong Yang,et al. Distributed fault-tolerant control systems design against actuator faults and faulty interconnection links: An adaptive method , 2009, 2009 American Control Conference.
[84] P. Kundur,et al. Power system stability and control , 1994 .
[85] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[86] Sonia Martínez,et al. On resilient consensus against replay attacks in operator-vehicle networks , 2012, 2012 American Control Conference (ACC).
[87] P. Antsaklis,et al. Stability of the pseudo-inverse method for reconfigurable control systems , 1991 .
[88] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[89] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[90] Rolf Isermann,et al. Fault-diagnosis systems : an introduction from fault detection to fault tolerance , 2006 .
[91] A.G. Phadke,et al. The Wide World of Wide-area Measurement , 2008, IEEE Power and Energy Magazine.
[92] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[93] Fernando Paganini,et al. Distributed control of spatially invariant systems , 2002, IEEE Trans. Autom. Control..
[94] M. Demetriou. Using unknown input observers for robust adaptive fault detection in vector second-order systems , 2005 .
[95] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[96] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[97] Jan Lunze,et al. Plug-and-Play control - Theory and implementation , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).
[98] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[99] Janusz Bialek,et al. Power System Dynamics: Stability and Control , 2008 .
[100] P. Barooah,et al. Graph Effective Resistance and Distributed Control: Spectral Properties and Applications , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[101] Yaakov Bar-Shalom. Update with out-of-sequence measurements in tracking: exact solution , 2002 .
[102] Craig G. Rieger. Notional examples and benchmark aspects of a resilient control system , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[103] Thomas Rid. Cyber War Will Not Take Place , 2012 .
[104] K. Åström. Introduction to Stochastic Control Theory , 1970 .
[105] Eric Chien,et al. W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.
[106] Qi Zhang,et al. Distributed fault detection and isolation for multimachine power systems , 2012, Proceedings of 2012 IEEE/ASME 8th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications.
[107] Steven X. Ding,et al. Advanced design scheme for fault tolerant distributed networked control systems , 2008 .
[108] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[109] M. Staroswiecki,et al. Fault recovery by nominal trajectory tracking , 2008, 2008 American Control Conference.
[110] Sirish L. Shah,et al. Fault detection and isolation in the presence of process uncertainties , 2005 .
[111] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[112] Alexander Schrijver,et al. Theory of linear and integer programming , 1986, Wiley-Interscience series in discrete mathematics and optimization.
[113] Jasbir S. Arora,et al. Survey of multi-objective optimization methods for engineering , 2004 .
[114] Astrom. Computer Controlled Systems , 1990 .
[115] Gerhard P Hancke,et al. Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.
[116] Giorgio Battistelli,et al. Unfalsified Virtual Reference Adaptive Switching Control of Plants with Persistent Disturbances , 2008 .
[117] Khosrow Moslehi,et al. Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.
[118] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[119] Jean-Baptiste Hiriart-Urruty,et al. Global Optimality Conditions in Maximizing a Convex Quadratic Function under Convex Quadratic Constraints , 2001, J. Glob. Optim..
[120] Jean-Pierre Richard,et al. Time-delay systems: an overview of some recent advances and open problems , 2003, Autom..
[121] Fatos Xhafa,et al. Special issue on cyber physical systems , 2013, Computing.
[122] A. Willsky,et al. Failure detection and identification , 1989 .
[123] W. H. Kwon,et al. Quadratic stability and stabilization of linear systems with Frobenius norm-bounded uncertainties , 1996, IEEE Trans. Autom. Control..
[124] Kun Ji,et al. Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[125] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[126] Thomas Steffen,et al. Control Reconfiguration After Actuator Failures Using Disturbance Decoupling Methods , 2006, IEEE Transactions on Automatic Control.
[127] Ciwei Gao,et al. Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[128] Jie Chen,et al. Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.
[129] Qingbo Yang,et al. A Survey of Anomaly Detection Methods in Networks , 2009, 2009 International Symposium on Computer Network and Multimedia Technology.
[130] Jie Chen,et al. Observer-based fault detection and isolation: robustness and applications , 1997 .
[131] Mikael Gidlund,et al. Future research challenges in wireless sensor and actuator networks targeting industrial automation , 2011, 2011 9th IEEE International Conference on Industrial Informatics.
[132] José M. F. Moura,et al. Distributing the Kalman Filter for Large-Scale Systems , 2007, IEEE Transactions on Signal Processing.
[133] Ron J. Patton,et al. FAULT-TOLERANT CONTROL SYSTEMS: THE 1997 SITUATION , 1997 .
[134] P. Frank,et al. Survey of robust residual generation and evaluation methods in observer-based fault detection systems , 1997 .
[135] Jerry M. Mendel,et al. IEEE control systems society , 2004, IEEE Control Systems.
[136] Reza Olfati-Saber,et al. Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.
[137] Nathan van de Wouw,et al. Reconfigurable control of piecewise affine systems with actuator and sensor faults: Stability and tracking , 2011, Autom..
[138] Mathias Ekstedt,et al. The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures , 2013, IEEE Systems Journal.
[139] Karl Henrik Johansson,et al. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.
[140] Marios M. Polycarpou,et al. Distributed Fault Diagnosis With Overlapping Decompositions: An Adaptive Approximation Approach , 2009, IEEE Transactions on Automatic Control.
[141] Paulo Tabuada,et al. Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[142] Michel Kinnaert,et al. Diagnosis and Fault-tolerant Control, 2nd edition , 2006 .
[143] Youmin Zhang,et al. Bibliographical review on reconfigurable fault-tolerant control systems , 2003, Annu. Rev. Control..
[144] Torkel Glad,et al. Resolving actuator redundancy - optimal control vs. control allocation , 2005, Autom..
[145] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[146] J. J. Serrano,et al. Distributed industrial control systems: a fault-tolerant architecture , 1999, Microprocess. Microsystems.
[147] M.J. Ellsworth,et al. The evolution of water cooling for IBM large server systems: Back to the future , 2008, 2008 11th Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems.
[148] Marc E. Pfetsch,et al. Exact and Approximate Sparse Solutions of Underdetermined Linear Equations , 2008, SIAM J. Sci. Comput..
[149] Orest Iftime,et al. Proceedings of the 16th IFAC World congress , 2006 .
[150] David Wetherall,et al. Computer networks, 5th Edition , 2011 .
[151] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[152] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[153] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[154] Jan Dimon Bendtsen,et al. Plug-and-Play Control—Modifying Control Systems Online , 2013, IEEE Transactions on Control Systems Technology.
[155] Anjan Bose,et al. On-line power system security analysis , 1992, Proc. IEEE.
[156] Marcel Staroswiecki,et al. Supervisory fault tolerant control for a class of uncertain nonlinear systems , 2009, Autom..
[157] Rolf Isermann,et al. Model-based fault-detection and diagnosis - status and applications , 2004, Annu. Rev. Control..
[158] Harvey J. Everett. Generalized Lagrange Multiplier Method for Solving Problems of Optimum Allocation of Resources , 1963 .
[159] Ella M. Atkins,et al. Distributed multi‐vehicle coordinated control via local information exchange , 2007 .
[160] K. J. Morrisse,et al. Distributed Control Schemes for wind-farm power regulation , 2012, 2012 North American Power Symposium (NAPS).
[161] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[162] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.
[163] Yuwa Chompoobutrgool,et al. Survey on power system stabilizers control and their prospective applications for power system damping using Synchrophasor‐based wide‐area systems , 2011 .
[164] Naum Zuselevich Shor,et al. Minimization Methods for Non-Differentiable Functions , 1985, Springer Series in Computational Mathematics.
[165] Jochen Trumpf,et al. Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, CDC-ECC 2011, Orlando, FL, USA, December 12-15, 2011 , 2011, CDC-ECE.
[166] Hiroaki Nishino,et al. Distributed Detection of Cyber Attacks and Faults for Power Systems , 2014 .
[167] Ernst Scholtz,et al. Graphical observer design suitable for large-scale DAE power systems , 2008, 2008 47th IEEE Conference on Decision and Control.
[168] Jie Chen,et al. Design of unknown input observers and robust fault detection filters , 1996 .
[169] Fabrizio Grandoni,et al. A note on the complexity of minimum dominating set , 2006, J. Discrete Algorithms.
[170] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[171] Israel Koren,et al. Fault-Tolerant Systems , 2007 .
[172] Marcello Farina,et al. Plug-and-Play Decentralized Model Predictive Control for Linear Systems , 2013, IEEE Transactions on Automatic Control.
[173] S. Kaplan,et al. On The Quantitative Definition of Risk , 1981 .
[174] Pablo Soldati,et al. Modular Design of Jointly Optimal Controllers and Forwarding Policies for Wireless Control , 2012, IEEE Transactions on Automatic Control.
[175] S. T. McCormick,et al. A combinatorial approach to some sparse matrix problems , 1983 .
[176] Euhanna Ghadimi,et al. The ADMM algorithm for distributed averaging: Convergence rates and optimal parameter selection , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[177] Ian Postlethwaite,et al. Multivariable Feedback Control: Analysis and Design , 1996 .
[178] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[179] Karl Henrik Johansson,et al. Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.