Mitigation of sensor attacks on legacy industrial control systems
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[2] Mustapha Ouladsine,et al. An actuator fault detection, isolation and estimation system for an UAV using input observers , 2007, 2007 European Control Conference (ECC).
[3] Thomas Steffen,et al. Control Reconfiguration of Dynamical Systems: Linear Approaches and Structural Tests , 2005 .
[4] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[5] Nicanor Quijano,et al. Response and reconfiguration of cyber-physical control systems: A survey , 2015, 2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC).
[6] Semyon M. Meerkov,et al. Resilient plant monitoring systems: Techniques, analysis, design, and performance evaluation , 2015 .
[7] Youmin Zhang,et al. Bibliographical review on reconfigurable fault-tolerant control systems , 2003, Annu. Rev. Control..
[8] Jie Chen,et al. Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.
[9] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[10] Paulo Tabuada,et al. Secure State Estimation Against Sensor Attacks in the Presence of Noise , 2015, IEEE Transactions on Control of Network Systems.
[11] Panganamala Ramana Kumar,et al. Secure control of networked cyber-physical systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[12] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[13] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.