Observability-based secure state encryption design for cyberphysical systems
暂无分享,去创建一个
[1] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[2] Arthur J. Krener,et al. Measures of unobservability , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[3] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[4] Karl Henrik Johansson,et al. Cyberphysical Security in Networked Control Systems: An Introduction to the Issue , 2015 .
[5] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[6] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[8] George J. Pappas,et al. State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.
[9] Liang Xu,et al. A quantitative measure of observability and controllability , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[10] Anthony M. Bloch,et al. Nonlinear Dynamical Control Systems (H. Nijmeijer and A. J. van der Schaft) , 1991, SIAM Review.
[11] B. Tibken,et al. Observability of nonlinear systems - an algebraic approach , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[12] Bruno Sinopoli,et al. Integrity attacks on cyber-physical systems , 2012, HiCoNS '12.
[13] W. Kang,et al. Computational Analysis of Control Systems Using Dynamic Optimization , 2009, 0906.0215.
[14] Nikhil Chopra,et al. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics. , 2016, Chaos.
[15] W. Kang,et al. Observability for optimal sensor locations in data assimilation , 2015 .
[16] Nikhil Chopra,et al. On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).
[17] A. Krener,et al. Nonlinear controllability and observability , 1977 .
[18] Sonia Martínez,et al. On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[19] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[20] Saurabh Amin,et al. In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.
[21] Jorge Nocedal,et al. Algorithm 778: L-BFGS-B: Fortran subroutines for large-scale bound-constrained optimization , 1997, TOMS.