Fasle data injection attacks in cyber-physical systems based on inaccurate model
暂无分享,去创建一个
[1] Sun Dehui,et al. False data injection attacks for output tracking control systems , 2015, 2015 34th Chinese Control Conference (CCC).
[2] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[3] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[4] Soummya Kar,et al. Cyber physical attacks constrained by control objectives , 2016, 2016 American Control Conference (ACC).
[5] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[6] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[7] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[8] Ling Shi,et al. Guest Editorial Special Issue on Secure Control of Cyber-Physical Systems , 2017, IEEE Trans. Control. Netw. Syst..
[9] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[10] Lihua Xie,et al. Resilience and Performance Analysis for State Estimation against Integrity Attacks , 2016 .
[11] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[12] Ruochi Zhang,et al. Stealthy control signal attacks in vector LQG systems , 2016, 2016 American Control Conference (ACC).
[13] Dehui Sun,et al. False data injection attacks for a class of output tracking control systems , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).
[14] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[15] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[16] T. M. Chen,et al. Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..
[17] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[18] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[19] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[20] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[21] Tongwen Chen,et al. Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[22] Yilin Mo,et al. Security in cyber-physical systems: Controller design against Known-Plaintext Attack , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[23] Donghua Zhou,et al. Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.
[24] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[25] Antonio Bicchi,et al. Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.
[26] Emilio Frazzoli,et al. Resilient state estimation against switching attacks on stochastic cyber-physical systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[27] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[28] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[29] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[30] R. K. Mehra,et al. Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .
[31] Weiyi Liu,et al. Cyber Security Analysis for State Estimators in Air Traffic Control Systems , 2012 .
[32] Ruixin Niu,et al. System state estimation in the presence of false information injection , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[33] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .