Modeling and Optimizing the Performance-Security Tradeoff on D-NCS Using the Coevolutionary Paradigm
暂无分享,去创建一个
[1] Wolfgang Granzer,et al. Security in Building Automation Systems , 2010, IEEE Transactions on Industrial Electronics.
[2] Mo-Yuen Chow,et al. Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.
[3] S.K.S. Gupta,et al. A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[4] A.A. Creery,et al. Industrial cybersecurity for a power system and SCADA networks - Be secure , 2007, IEEE Industry Applications Magazine.
[5] Stephen S. Yau,et al. An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems , 2009, 2009 IEEE International Conference on Web Services.
[6] Rajarathnam Chandramouli,et al. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[7] Meikang Qiu,et al. Static Security Optimization for Real-Time Systems , 2009, IEEE Transactions on Industrial Informatics.
[8] Thomas P. von Hoff,et al. Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.
[9] Kay Chen Tan,et al. A Competitive-Cooperative Coevolutionary Paradigm for Dynamic Multiobjective Optimization , 2009, IEEE Transactions on Evolutionary Computation.
[10] Alfredo Pironti,et al. Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access , 2011, IEEE Transactions on Industrial Informatics.
[11] Scott A. Brandt,et al. Draco: Efficient Resource Management for Resource-Constrained Control Tasks , 2009, IEEE Transactions on Computers.
[12] Özgür Gürbüz,et al. Wireless Model-Based Predictive Networked Control System Over Cooperative Wireless Network , 2011, IEEE Transactions on Industrial Informatics.
[13] Mo-Yuen Chow,et al. A trade-off model for performance and security in secured Networked Control Systems , 2011, 2011 IEEE International Symposium on Industrial Electronics.
[14] André Teixeira,et al. Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.
[15] K. Wong,et al. Analyzing oligopolistic electricity market using coevolutionary computation , 2006, IEEE Transactions on Power Systems.
[16] Weiming Shen,et al. Nrc Publications Archive (nparc) Archives Des Publications Du Cnrc (nparc) Distributed Device Networks with Security Constraints Distributed Device Networks with Security Constraints* Distributed Device Networks with Security Constraints , 2022 .
[17] Hideki Hashimoto,et al. Path tracking control of mobile robots using a quadratic curve , 1996, Proceedings of Conference on Intelligent Vehicles.
[18] Kenneth A. De Jong,et al. Cooperative Coevolution: An Architecture for Evolving Coadapted Subcomponents , 2000, Evolutionary Computation.
[19] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[20] Kay Chen Tan,et al. A distributed Cooperative coevolutionary algorithm for multiobjective optimization , 2006, IEEE Transactions on Evolutionary Computation.
[21] Francisco Maciá Pérez,et al. Network Intrusion Detection System Embedded on a Smart Sensor , 2011, IEEE Transactions on Industrial Electronics.
[22] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[23] Mo-Yuen Chow,et al. Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms , 2012, IEEE Transactions on Industrial Electronics.
[24] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[25] J. Friedman. A Non-cooperative Equilibrium for Supergames , 1971 .
[26] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[27] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.