暂无分享,去创建一个
Ram Vasudevan | Pedro Hespanhol | Anil Aswani | Matthew Porter | A. Aswani | Matthew Porter | P. Hespanhol | Ram Vasudevan
[1] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[2] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[3] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[4] H. E. Tseng,et al. Linear model predictive control for lane keeping and obstacle avoidance on low curvature roads , 2013, 16th International IEEE Conference on Intelligent Transportation Systems (ITSC 2013).
[5] Panganamala Ramana Kumar,et al. Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[6] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[7] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[8] R. Bhatia. Matrix Analysis , 1996 .
[9] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[10] G. Como,et al. Convexity and Robustness of Dynamic Network Traffic Assignment for Control of Freeway Networks , 2016 .
[11] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[13] C. Stein. A bound for the error in the normal approximation to the distribution of a sum of dependent random variables , 1972 .
[14] Panganamala Ramana Kumar,et al. On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).
[15] Michael I. Jordan,et al. Matrix concentration inequalities via the method of exchangeable pairs , 2012, 1201.6002.
[16] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[17] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[18] Shankar Mohan,et al. Convex computation of the reachable set for hybrid systems with parametric uncertainty , 2016, 2016 American Control Conference (ACC).
[19] Jakub Bernat,et al. Multi-modelling as new estimation schema for high-gain observers , 2015, Int. J. Control.
[20] Panganamala Ramana Kumar,et al. Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.
[21] Thomas Parisini,et al. Distributed watermarking for secure control of microgrids under replay attacks , 2018, ArXiv.
[22] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[23] E. Polak,et al. On the Perpetual Collision-Free RHC of Fleets of Vehicles , 2010 .
[24] Ruzena Bajcsy,et al. Safe semi-autonomous control with enhanced driver modeling , 2012, 2012 American Control Conference (ACC).
[25] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[26] Shreyas Sundaram,et al. Distributed Observers for LTI Systems , 2016, IEEE Transactions on Automatic Control.
[27] Claire Tomlin,et al. Game-theoretic routing of GPS-assisted vehicles for energy efficiency , 2011, Proceedings of the 2011 American Control Conference.
[28] Paulo Tabuada,et al. Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[29] Maryam Kamgarpour,et al. A Hierarchical Flight Planning Framework for Air Traffic Management , 2012, Proceedings of the IEEE.
[30] Ram Vasudevan,et al. Statistical Watermarking for Networked Control Systems , 2017, 2018 Annual American Control Conference (ACC).
[31] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[32] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[33] Qaisar Shafi,et al. Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.
[34] Ram Vasudevan,et al. Dynamic watermarking for general LTI systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[35] Adrian Perrig,et al. Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.
[36] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[37] Shreyas Sundaram,et al. Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[38] Jaideep Srivastava,et al. Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) , 2005 .