Sensor attack detection in the presence of transient faults
暂无分享,去创建一个
Insup Lee | Miroslav Pajic | James Weimer | Radoslav Ivanov | Junkil Park | I. Lee | Radoslav Ivanov | James Weimer | M. Pajic | Junkil Park | Insup Lee
[1] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[2] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[3] Rolf Isermann,et al. Process Fault Detection Based on Modeling and Estimation Methods , 1982 .
[4] Rolf Isermann,et al. Process fault detection based on modeling and estimation methods - A survey , 1984, Autom..
[5] Keith Marzullo,et al. Tolerating failures of continuous-valued sensors , 1990, TOCS.
[6] Paul M. Frank,et al. Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results , 1990, Autom..
[7] D. N. Jayasimha. Fault tolerance in a multisensor environment , 1994, Proceedings of IEEE 13th Symposium on Reliable Distributed Systems.
[8] S. Sitharama Iyengar,et al. Robust Distributed Comupting and Sensing Algorithm , 1996, Computer.
[9] P. Frank,et al. Survey of robust residual generation and evaluation methods in observer-based fault detection systems , 1997 .
[10] Jie Chen,et al. Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.
[11] T. Başar,et al. A New Approach to Linear Filtering and Prediction Problems , 2001 .
[12] Carlo Novara,et al. Set Membership identification of nonlinear systems , 2004, Autom..
[13] Yunmin Zhu,et al. Optimal interval estimation fusion based on sensor interval estimates with confidence degrees , 2006, Autom..
[14] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[15] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[16] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[17] J. S. Warner,et al. A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .
[18] Goran Frehse,et al. Formal Analysis of Timing Effects on Closed-Loop Properties of Control Software , 2014, 2014 IEEE Real-Time Systems Symposium.
[19] Insup Lee,et al. Attack-resilient sensor fusion , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[20] Insup Lee,et al. Resilient multidimensional sensor fusion using measurement history , 2014, HiCoNS.
[21] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).