On the Performance Analysis of Reset Attack in Cyber-Physical Systems
暂无分享,去创建一个
Yilin Mo | Yuqing Ni | Ziyang Guo | Ling Shi | Yilin Mo | Ling Shi | Yuqing Ni | Ziyang Guo
[1] Jared R. Leadbetter,et al. Control in an Information Rich World Report of the Panel on Future Directions in Control , Dynamics , and Systems , 2002 .
[2] Bharat Bhushan,et al. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[3] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[4] Syed Hassan Ahmed,et al. Cyber Physical System: Architecture, applications and research challenges , 2013, 2013 IFIP Wireless Days (WD).
[5] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[6] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[7] Subhrakanti Dey,et al. Estimation in Wireless Sensor Networks With Security Constraints , 2017, IEEE Transactions on Aerospace and Electronic Systems.
[8] Soummya Kar,et al. Cyber-Physical Attacks With Control Objectives , 2016, IEEE Transactions on Automatic Control.
[9] João Pedro Hespanha,et al. Linear Systems Theory , 2009 .
[10] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[11] J. Efrim Boritz,et al. IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..
[12] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[13] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.
[14] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[15] Daniel E. Quevedo,et al. State estimation over Markovian packet dropping links in the presence of an eavesdropper , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[16] Petros G. Voulgaris,et al. On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..
[17] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[18] Akash Mittal,et al. A Review of DDOS Attack and its Countermeasures in TCP Based Networks , 2011 .
[19] Yusnani Mohd Yussoff,et al. A Review of Physical Attacks and Trusted Platforms in Wireless Sensor Networks , 2012 .
[20] João M. F. Xavier,et al. Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.
[21] Richard M. Murray,et al. Panel on Future Directions in Control, Dynamics, and Systems , 2000 .
[22] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[23] R. K. Mehra,et al. Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .
[24] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[25] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[26] Lang Tong,et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.
[27] Ling Shi,et al. Optimal denial-of-service attack on feedback channel against acknowledgment-based sensor power schedule for remote estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[28] S. Shankar Sastry,et al. Attacks And Defenses Of Ubiquitous Sensor Networks , 2009 .
[29] Fatos Xhafa,et al. Special issue on cyber physical systems , 2013, Computing.
[30] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[31] Yuval Ishai,et al. Private Circuits II: Keeping Secrets in Tamperable Circuits , 2006, EUROCRYPT.