Event-Triggered Watermarking Control to Handle Cyber-Physical Integrity Attacks

[1]  Joaquín García,et al.  Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[2]  Roy S. Smith,et al.  Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.

[3]  Bruno Sinopoli,et al.  Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.

[4]  Igor V. Nikiforov,et al.  A statistical method for detecting cyber/physical attacks on SCADA systems , 2014, 2014 IEEE Conference on Control Applications (CCA).

[5]  Bruno Sinopoli,et al.  Detecting integrity attacks on control systems using robust physical watermarking , 2014, 53rd IEEE Conference on Decision and Control.

[6]  Ling Shi,et al.  Stochastic event-triggered sensor scheduling for remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[7]  Paulo Tabuada,et al.  Periodic event-triggered control for nonlinear systems , 2013, 52nd IEEE Conference on Decision and Control.

[8]  Keyou You,et al.  Survey of Recent Progress in Networked Control Systems , 2013 .

[9]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[10]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[11]  Panganamala Ramana Kumar,et al.  Prolog to the Section on Cyber-Physical Systems , 2012, Proc. IEEE.

[12]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[13]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[14]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[15]  H. G. Natke System identification: Torsten Söderström and Petre Stoica , 1992, Autom..

[16]  B. Brumback,et al.  A Chi-square test for fault-detection in Kalman filters , 1987 .

[17]  Mohammad Asif Ikbal,et al.  Step Size Optimization of LMS Algorithm Using Aunt Colony Optimization & Its comparison with Particle Swarm optimization Algorithm in System Identification , 2015 .

[18]  Vittal S. Rao,et al.  Detection and Protection Against Intrusions on Smart Grid Systems , 2014 .

[19]  C. Calvo,et al.  Sistemas de control basados en red. Modelado y diseño de estructuras de control. , 2011 .

[20]  Märta Barenthin Syberg Complexity Issues, Validation and Input Design for Control in System Identification , 2008 .