Distributed Secure State Estimation Using Diffusion Kalman Filters and Reachability Analysis
暂无分享,去创建一个
[1] Matthias Althoff,et al. Implementation of Interval Arithmetic in CORA 2016 , 2016, ARCH@CPSWeek.
[2] Matthias Althoff,et al. Implementation of Taylor models in CORA 2018 , 2018, ARCH@ADHS.
[3] Yongduan Song,et al. Distributed Secure State Estimation and Control for CPSs Under Sensor Attacks , 2020, IEEE Transactions on Cybernetics.
[4] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[5] G. Padmavathi,et al. A Survey on Various Cyber Attacks and their Classification , 2013, Int. J. Netw. Secur..
[6] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[7] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[8] Antoine Girard,et al. Reachability of Uncertain Linear Systems Using Zonotopes , 2005, HSCC.
[9] Wenyuan Xu,et al. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[11] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[12] Florian Dörfler,et al. A divide-and-conquer approach to distributed attack identification , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[13] Guang-Hong Yang,et al. Distributed secure state estimation for cyber-physical systems under sensor attacks , 2019, Autom..
[14] Ali H. Sayed,et al. Diffusion strategies for distributed Kalman filtering: formulation and performance analysis , 2008 .
[15] Mani B. Srivastava,et al. SecSens: Secure State Estimation with Application to Localization and Time Synchronization , 2018, ArXiv.
[16] Matthias Althoff,et al. Reachability Analysis and its Application to the Safety Assessment of Autonomous Cars , 2010 .
[17] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[18] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[19] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[20] Ali H. Sayed,et al. Distributed nonlinear Kalman filtering with applications to wireless localization , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[21] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[22] Mani B. Srivastava,et al. D-SLATS: Distributed Simultaneous Localization and Time Synchronization , 2017, MobiHoc.
[23] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[24] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[25] João Pedro Hespanha,et al. Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).
[26] Vicenç Puig,et al. Set-membership approach and Kalman observer based on zonotopes for discrete-time descriptor systems , 2018, Autom..
[27] Eduardo F. Camacho,et al. Guaranteed state estimation by zonotopes , 2005, Autom..
[28] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[29] Matthias Althoff,et al. An Introduction to CORA 2015 , 2015, ARCH@CPSWeek.