Adversarial control scheme for an islanded power plant
暂无分享,去创建一个
[1] Nikolaos Athanasopoulos,et al. Invariant set computation for constrained uncertain discrete-time linear systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[2] Anthony Tzes,et al. Adversary control strategies for discrete-time systems , 2014, 2014 European Control Conference (ECC).
[3] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[4] Karl Henrik Johansson,et al. Revealing stealthy attacks in control systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] John Lygeros,et al. A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).
[6] Jean-Pierre Aubin,et al. Viability theory , 1991 .
[7] André Teixeira,et al. Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.
[8] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[9] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[10] Olle I. Elgerd,et al. Electric Energy Systems Theory: An Introduction , 1972 .
[11] Anthony Tzes,et al. Covert attack on a discrete-time system with limited use of the available disruption resources , 2015, 2015 European Control Conference (ECC).
[12] Jian-Wei Wang,et al. Cascade-based attack vulnerability on the US power grid. , 2009 .
[13] John Lygeros,et al. Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.
[14] Franco Blanchini,et al. Set-theoretic methods in control , 2007 .
[15] G. Bitsoris. On the positive invariance of polyhedral sets for discrete-time systems , 1988 .