Kalman Filter Based Secure State Estimation and Individual Attacked Sensor Detection in Cyber-Physical Systems
暂无分享,去创建一个
Sebastian Fischmeister | John W. Simpson-Porco | John G. Thistle | Mohammad Hossein Basiri | J. G. Thistle | S. Fischmeister | M. Basiri | J. Simpson-Porco
[1] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[2] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[3] Paulo Tabuada,et al. Non-invasive Spoofing Attacks for Anti-lock Braking Systems , 2013, CHES.
[4] Vijay Gupta,et al. On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.
[5] Paulo Tabuada,et al. Sound and complete state estimation for linear dynamical systems under sensor attacks using Satisfiability Modulo Theory solving , 2015, 2015 American Control Conference (ACC).
[6] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[7] Paulo Tabuada,et al. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.
[8] Sangjun Lee,et al. Attack-aware multi-sensor integration algorithm for autonomous vehicle navigation systems , 2017, 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[9] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[10] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[11] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[12] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[13] Claire J. Tomlin,et al. Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks , 2018, Autom..
[14] F. Bullo,et al. A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.
[15] G. Basile,et al. Controlled and conditioned invariants in linear system theory , 1992 .
[16] Karl Henrik Johansson,et al. Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter , 2017 .
[17] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.