A Resilient Control Approach to Secure Cyber Physical Systems (CPS) with an Application on Connected Vehicles
暂无分享,去创建一个
[1] Ravishankar K. Iyer,et al. An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[2] Angelo Alessandri,et al. Design of Luenberger Observers for a Class of Hybrid Linear Systems , 2001, HSCC.
[3] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[4] Antonio Bicchi,et al. Identifying cyber attacks via local model information , 2010, 49th IEEE Conference on Decision and Control (CDC).
[5] Fan Bai,et al. Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications , 2006, 2006 IEEE Intelligent Transportation Systems Conference.
[6] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[7] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[8] Yunchuan Guo,et al. Cyber Attacks Prediction Model Based on Bayesian Network , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.
[9] P. Barooah,et al. Control of Large Vehicular Platoons: Improving Closed Loop Stability by Mistuning , 2007, 2007 American Control Conference.
[10] G Naus,et al. Cooperative adaptive cruise control, design and experiments , 2010, Proceedings of the 2010 American Control Conference.
[11] Jiang Lu,et al. Robust Cyber-Physical Systems: Concept, models, and implementation , 2016, Future Gener. Comput. Syst..
[12] Richard M. Murray,et al. Optimal LQG control across packet-dropping links , 2007, Syst. Control. Lett..
[13] Ulf E. Larson,et al. Securing vehicles against cyber attacks , 2008, CSIIRW '08.
[14] Ellen van Nunen,et al. Safety in the Face of Uncertainty , 2014, International Journal of Intelligent Transportation Systems Research.
[15] Rolf Isermann,et al. Process fault detection based on modeling and estimation methods - A survey , 1984, Autom..
[16] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[17] Daniel W. C. Ho,et al. Robust observer design for Itô stochastic time-delay systems via sliding mode control , 2006, Syst. Control. Lett..
[18] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[19] P. Barooah,et al. Error Amplification and Disturbance Propagation in Vehicle Strings with Decentralized Linear Control , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[20] Delphine Bresch-Pietri,et al. Adaptive trajectory tracking despite unknown input delay and plant parameters , 2009, Autom..
[21] D. Helbing. Traffic and related self-driven many-particle systems , 2000, cond-mat/0012229.
[22] Maarten Steinbuch,et al. String-Stable CACC Design and Experimental Validation: A Frequency-Domain Approach , 2010, IEEE Transactions on Vehicular Technology.
[23] Ulf E. Larson,et al. Simulated attacks on CAN buses: vehicle virus , 2008 .
[24] M. Krstić. Boundary Control of PDEs: A Course on Backstepping Designs , 2008 .
[25] Richard M. Murray,et al. State estimation over packet dropping networks using multiple description coding , 2006, Autom..
[26] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[27] Han-Shue Tan,et al. Design and field testing of a Cooperative Adaptive Cruise Control system , 2010, Proceedings of the 2010 American Control Conference.
[28] Mike McDonald,et al. Car-following: a historical review , 1999 .
[29] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[30] Nitin H. Vaidya,et al. A vehicle-to-vehicle communication protocol for cooperative collision warning , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[31] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[32] Ricardo G. Sanfelice,et al. A hybrid observer with a continuous intersample injection in the presence of sporadic measurements , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[33] G Rizzoni,et al. Nonlinear parity equation based residual generation for diagnosis of automotive engine faults , 1995 .
[34] Huajing Fang,et al. Takagi-sugeno fuzzy-model-based fault detection for networked control systems with Markov delays , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[35] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[36] Xiongxi Zhang,et al. Observer-based fault detection for stochastic delayed systems in network environment , 2014, Proceeding of the 11th World Congress on Intelligent Control and Automation.
[37] Alvin S. Lim,et al. An Empirical Study on Ad Hoc Performance of DSRC and Wi-Fi Vehicular Communications , 2013, Int. J. Distributed Sens. Networks.
[38] Pietro Tesi,et al. On resilient control of nonlinear systems under Denial-of-Service , 2014, 53rd IEEE Conference on Decision and Control.
[39] Tamer Basar,et al. Optimal control of dynamical systems over unreliable communication links , 2004 .
[40] Christopher Edwards,et al. On the Design of Sliding-Mode Static-Output-Feedback Controllers for Systems With State Delay , 2009, IEEE Transactions on Industrial Electronics.
[41] Thomas M. Chen,et al. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.
[42] Prabir Barooah,et al. Approximation error in PDE-based modelling of vehicular platoons , 2012, Int. J. Control.
[43] Mashrur Chowdhury,et al. A Review of Communication, Driver Characteristics, and Controls Aspects of Cooperative Adaptive Cruise Control (CACC) , 2016, IEEE Transactions on Intelligent Transportation Systems.
[44] Nathan van de Wouw,et al. Lp String Stability of Cascaded Systems: Application to Vehicle Platooning , 2014, IEEE Transactions on Control Systems Technology.
[45] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[46] João Pedro Hespanha,et al. Mistuning-Based Control Design to Improve Closed-Loop Stability Margin of Vehicular Platoons , 2008, IEEE Transactions on Automatic Control.
[47] Martijn C. Schut,et al. Approximating safe spacing policies for adaptive cruise control strategies , 2011, 2011 IEEE Vehicular Networking Conference (VNC).
[48] Subhrakanti Dey,et al. Stability of Kalman filtering with Markovian packet losses , 2007, Autom..
[49] A. Willsky,et al. Observability of discrete event dynamic systems , 1990 .
[50] Theodore L. Willke,et al. A survey of inter-vehicle communication protocols and their applications , 2009, IEEE Communications Surveys & Tutorials.
[51] Gábor Orosz,et al. Digital Effects and Delays in Connected Vehicles: Linear Stability and Simulations , 2013 .
[52] Hamed Mohsenian Rad,et al. False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[53] Camille Alain Rabbath,et al. Modeling of packet dropout for UAV wireless communications , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[54] M. Shalini,et al. Security Issues And Challenges For Cyber Physical System , 2018 .
[55] Nader Meskin,et al. Fault Diagnosis in a Network of Unmanned Aerial Vehicles with Imperfect Communication Channels , 2009 .
[56] J. Gertler. Fault detection and isolation using parity relations , 1997 .
[57] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[58] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[59] Krishna R. Pattipati,et al. An Integrated Diagnostic Development Process for Automotive Engine Control Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[60] J. Christian Gerdes,et al. Integrating Inertial Sensors With Global Positioning System (GPS) for Vehicle Dynamics Control , 2004 .
[61] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[62] Bruno Sinopoli,et al. Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.
[63] Delphine Bresch-Pietri,et al. Delay-Adaptive Predictor Feedback for Systems With Unknown Long Actuator Delay $ $ , 2010, IEEE Transactions on Automatic Control.
[64] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[65] André Teixeira,et al. Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.
[66] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[67] Hao Ye,et al. Fault diagnosis of networked control systems , 2007, Annu. Rev. Control..
[68] Hyeongcheol Lee,et al. A Study of Adaptive Cruise Control System to Improve Fuel Efficiency , 2017 .
[69] Anuradha M. Annaswamy,et al. Stable Adaptive Systems , 1989 .
[70] D.K. Nilsson,et al. An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.
[71] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[72] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[73] Zhong-Hua Pang,et al. Secure Networked Control Systems under Denial of Service Attacks , 2011 .
[74] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[75] Pierluigi Pisu,et al. A fuel economic model predictive control strategy for a group of connected vehicles in urban roads , 2015, 2015 American Control Conference (ACC).
[76] Paul M. Frank,et al. Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results , 1990, Autom..
[77] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[78] Nasser E. Nahi,et al. Optimal recursive estimation with uncertain observation , 1969, IEEE Trans. Inf. Theory.
[79] Nathan van de Wouw,et al. Graceful degradation of CACC performance subject to unreliable wireless communication , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).
[80] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[81] E. Fridman,et al. Control under Quantization, Saturation and Delay: An LMI Approach , 2008 .
[82] Vadim I. Utkin,et al. Sliding mode control in electromechanical systems , 1999 .
[83] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[84] Qing Wang,et al. Robust fault detection and optimization for a network of unmanned vehicles with imperfect communication channels , 2014 .
[85] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[86] Nathan van de Wouw,et al. Cooperative Adaptive Cruise Control: Network-Aware Analysis of String Stability , 2014, IEEE Transactions on Intelligent Transportation Systems.
[87] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[88] Ming Jiang,et al. Modeling and estimation of networked control systems with time delays based on CTHMM , 2009, 2009 International Conference on Mechatronics and Automation.
[89] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[90] Steven E Shladover. Effects of Cooperative Adaptive Cruise Control on Traffic Flow: Testing Drivers' Choices of Following Distances , 2009 .
[91] Kenneth A. Loparo,et al. Identification of time delays in linear stochastic systems , 1993 .
[92] Emilia Fridman,et al. Sliding mode control in the presence of input delay: A singular perturbation approach , 2012, Autom..
[93] Jie Chen,et al. Design of unknown input observers and robust fault detection filters , 1996 .
[94] Hai Le Vu,et al. Performance Analysis of the IEEE 802.11 MAC Protocol for DSRC Safety Applications , 2011, IEEE Transactions on Vehicular Technology.
[95] R. K. Mehra,et al. Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .