Optimal stealthy false data injection attacks in cyber-physical systems
暂无分享,去创建一个
[1] Guang-Hong Yang,et al. Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer , 2017, Inf. Sci..
[2] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[3] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[4] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[5] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[6] Guang-Hong Yang,et al. Data-Driven Coordinated Attack Policy Design Based on Adaptive $\mathcal {L}_2$-Gain Optimal Theory , 2018, IEEE Transactions on Automatic Control.
[7] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] Tat-Seng Chua,et al. Item Silk Road: Recommending Items from Information Domains to Social Users , 2017, SIGIR.
[9] Guang-Hong Yang,et al. Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism , 2018, IEEE Transactions on Automatic Control.
[10] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[11] Dan Ye,et al. A cooperative detection and compensation mechanism against Denial-of-Service attack for cyber-physical systems , 2018, Inf. Sci..
[12] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[13] Dimitri P. Bertsekas,et al. Nonlinear Programming , 1997 .
[14] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[15] R. E. Kalman,et al. A New Approach to Linear Filtering and Prediction Problems , 2002 .
[16] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[17] Vijay Gupta,et al. On Kalman filtering in the presence of a compromised sensor: Fundamental performance bounds , 2014, 2014 American Control Conference.
[18] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[19] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[20] Guanghui Wen,et al. Bridging the gap between complex networks and smart grids , 2014 .
[21] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[22] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[23] Junmin Wang,et al. Adaptive Sliding-Mode Observer Design for a Selective Catalytic Reduction System of Ground-Vehicle Diesel Engines , 2016, IEEE/ASME Transactions on Mechatronics.
[24] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[25] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[26] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[27] B. Anderson,et al. Optimal Filtering , 1979, IEEE Transactions on Systems, Man, and Cybernetics.
[28] Hui Zhang,et al. Active Steering Actuator Fault Detection for an Automatically-Steered Electric Ground Vehicle , 2017, IEEE Transactions on Vehicular Technology.
[29] Guang-Hong Yang,et al. Improved adaptive resilient control against sensor and actuator attacks , 2018, Inf. Sci..
[30] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[31] Ling Shi,et al. Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation , 2019, IEEE Transactions on Control of Network Systems.
[32] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[33] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[34] Cheolhyeon Kwon,et al. Reachability Analysis for Safety Assurance of Cyber-Physical Systems Against Cyber Attacks , 2018, IEEE Transactions on Automatic Control.
[35] Tat-Seng Chua,et al. Unifying Virtual and Physical Worlds , 2017, ACM Trans. Inf. Syst..