暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using a moving target approach , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[2] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[3] A. Kurzhanski,et al. Ellipsoidal Calculus for Estimation and Control , 1996 .
[4] P. Varaiya,et al. Ellipsoidal Toolbox (ET) , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[5] Franco Blanchini,et al. Any domain of attraction for a linear constrained system is a tracking domain of attraction , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).
[6] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[7] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[8] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[9] D. Bertsekas,et al. On the minimax reachability of target sets and target tubes , 1971 .
[10] T. M. Chen,et al. Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..
[11] Manfred Morari,et al. Multi-Parametric Toolbox 3.0 , 2013, 2013 European Control Conference (ECC).
[12] Francesco Tedesco,et al. Model predictive control for constrained networked systems subject to data losses , 2015, Autom..
[13] Franco Blanchini,et al. Set-theoretic methods in control , 2007 .
[14] Edoardo Mosca,et al. An ellipsoidal off-line MPC scheme for uncertain polytopic discrete-time systems , 2008, Autom..
[15] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[16] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.