Stealthy Attacks for Partially-Observed Discrete Event Systems
暂无分享,去创建一个
Qi Zhang | Alessandro Giua | Carla Seatzu | ZhiWu Li | Qi Zhang | A. Giua | C. Seatzu | Zhiwu Li
[1] Ilija Jovanov,et al. Sporadic data integrity for secure state estimation , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[2] Stéphane Lafortune,et al. Detection and prevention of actuator enablement attacks in supervisory control systems , 2016, 2016 13th International Workshop on Discrete Event Systems (WODES).
[3] Santosh Biswas,et al. Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack , 2019, IEEE/CAA Journal of Automatica Sinica.
[4] Santosh Biswas,et al. Application of stochastic discrete event system framework for detection of induced low rate TCP attack. , 2015, ISA transactions.
[5] Jana Kosecka,et al. Control of Discrete Event Systems , 1992 .
[6] Christos G. Cassandras,et al. Introduction to Discrete Event Systems , 1999, The Kluwer International Series on Discrete Event Dynamic Systems.
[7] Ping Zhang,et al. Modeling and detection of cyber attacks on discrete event systems , 2018 .
[8] Stéphane Lafortune,et al. Stealthy deception attacks for cyber-physical systems , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[9] D. Thorsley,et al. Intrusion Detection in Controlled Discrete Event Systems , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[10] Alessandro Giua,et al. Supervisory enforcement of current-state opacity with uncomparable observations , 2016, 2016 13th International Workshop on Discrete Event Systems (WODES).
[11] Paulo Tabuada,et al. Supervisory Control of Discrete-Event Systems Under Attacks , 2017, Dynamic Games and Applications.
[12] Naren Ramakrishnan,et al. Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths , 2015, CCS.
[13] Marcos V. Moreira,et al. Detectable and Undetectable Network Attack Security of Cyber-physical Systems , 2018 .
[14] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[15] Rong Su,et al. Supervisor Synthesis to Thwart Cyber Attack with Bounded Sensor Reading Alterations , 2016, Autom..