Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks
暂无分享,去创建一个
Joaquín García | Luca De Cicco | Jose Rubio-Hernan | Joaquín García | L. D. Cicco | José Rubio-Hernán
[1] Joaquín García,et al. Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[2] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[3] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[4] Igor V. Nikiforov,et al. A statistical method for detecting cyber/physical attacks on SCADA systems , 2014, 2014 IEEE Conference on Control Applications (CCA).
[5] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.
[6] Ling Shi,et al. Stochastic event-triggered sensor scheduling for remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.
[7] Paulo Tabuada,et al. Periodic event-triggered control for nonlinear systems , 2013, 52nd IEEE Conference on Decision and Control.
[8] Keyou You,et al. Survey of Recent Progress in Networked Control Systems , 2013 .
[9] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[10] Florian Dörfler,et al. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[11] Panganamala Ramana Kumar,et al. Prolog to the Section on Cyber-Physical Systems , 2012, Proc. IEEE.
[12] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[13] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[14] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[15] H. G. Natke. System identification: Torsten Söderström and Petre Stoica , 1992, Autom..
[16] B. Brumback,et al. A Chi-square test for fault-detection in Kalman filters , 1987 .
[17] Mohammad Asif Ikbal,et al. Step Size Optimization of LMS Algorithm Using Aunt Colony Optimization & Its comparison with Particle Swarm optimization Algorithm in System Identification , 2015 .
[18] Vittal S. Rao,et al. Detection and Protection Against Intrusions on Smart Grid Systems , 2014 .
[19] C. Calvo,et al. Sistemas de control basados en red. Modelado y diseño de estructuras de control. , 2011 .
[20] Märta Barenthin Syberg. Complexity Issues, Validation and Input Design for Control in System Identification , 2008 .