The wireless control network: Monitoring for malicious behavior
暂无分享,去创建一个
Shreyas Sundaram | George J. Pappas | Christoforos N. Hadjicostis | Miroslav Pajic | Rahul Mangharam | M. Pajic | C. Hadjicostis | R. Mangharam | S. Sundaram | Rahul Mangharam | Miroslav Pajic | George Pappas
[1] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[2] Frank R. Kschischang,et al. Coding for Errors and Erasures in Random Network Coding , 2007, IEEE Transactions on Information Theory.
[3] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[4] Jacob van der Woude,et al. A graph-theoretic characterization for the rank of the transfer matrix of a structured system , 1991, Math. Control. Signals Syst..
[5] J. W. van deWoude. A graph theoretic characterization for the rank of the transfer matrix of a structured system , 1988 .
[6] Ulf Lindqvist,et al. An intrusion detection system for wireless process control systems , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[7] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[8] Tracey Ho,et al. Resilient network coding in the presence of Byzantine adversaries , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] Stephen Northcutt,et al. Network intrusion detection , 2003 .
[10] W. Marsden. I and J , 2012 .
[11] Gabor Karsai,et al. A testbed for secure and robust SCADA systems , 2008, SIGBED.
[12] Shreyas Sundaram,et al. The Wireless Control Network: Synthesis and robustness , 2010, 49th IEEE Conference on Decision and Control (CDC).
[13] J. Massey,et al. Invertibility of linear time-invariant dynamical systems , 1969 .
[14] A. Willsky. On the invertibility of linear systems , 1974 .
[15] C.N. Hadjicostis,et al. Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network , 2008, 2008 American Control Conference.
[16] Christian Commault,et al. Generic properties and control of linear structured systems: a survey , 2003, Autom..
[17] Richard M. Murray,et al. Data Transmission Over Networks for Estimation and Control , 2009, IEEE Transactions on Automatic Control.
[18] Shreyas Sundaram,et al. Distributed function calculation and consensus using linear iterative strategies , 2008, IEEE Journal on Selected Areas in Communications.
[19] Paul M. Frank,et al. Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy: A survey and some new results , 1990, Autom..
[20] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[21] Andrzej Pelc,et al. Broadcasting with locally bounded Byzantine faults , 2005, Inf. Process. Lett..
[22] Muriel Medard,et al. Resilient Network Coding in the Presence of , 2007 .
[23] D. West. Introduction to Graph Theory , 1995 .
[24] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[25] Jianying Zhou,et al. Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[26] Antonio Bicchi,et al. Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.