Security Against False Data-Injection Attack in Cyber-Physical Systems
暂无分享,去创建一个
[1] Petros G. Voulgaris,et al. On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..
[2] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[4] Urbashi Mitra,et al. Attack detection and secure estimation under false data injection attack in cyber-physical systems , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[5] Marceau Coupechoux,et al. Sequential Decision Algorithms for Measurement-Based Impromptu Deployment of a Wireless Relay Network Along a Line , 2015, IEEE/ACM Transactions on Networking.
[6] Soummya Kar,et al. Cyber physical attacks with control objectives and detection constraints , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[7] V. Borkar. Stochastic Approximation: A Dynamical Systems Viewpoint , 2008 .
[8] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[9] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[10] Urbashi Mitra,et al. Optimal Sensing and Data Estimation in a Large Sensor Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[11] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[12] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[13] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[14] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[15] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[16] J. Spall. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation , 1992 .
[17] Yilin Mo,et al. Attack-Resilient H_2, H_∞, and ℓ_1 State Estimator , 2018, 1803.07053.
[18] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[19] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[20] G. Smirnov. Introduction to the Theory of Differential Inclusions , 2002 .
[21] Chengnian Long,et al. Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks , 2017, IEEE Transactions on Control of Network Systems.
[22] Claire J. Tomlin,et al. Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.
[23] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[24] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[25] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.