Modification of Recursive Kalman Filter Algorithm for Adaptive Prediction of Cyber Resilience for Industrial Systems
暂无分享,去创建一个
[1] Igor Kotenko,et al. Applying Artificial Intelligence Methods to Network Attack Detection , 2018, AI in Cybersecurity.
[2] Max Donath,et al. American Control Conference , 1993 .
[3] Dmitry A. Moskvin,et al. Hierarchical approach to analyzing security breaches in information systems , 2017, Automatic Control and Computer Sciences.
[4] Maria A. Poltavtseva,et al. A Distributed Intrusion Detection System with Protection from an Internal Intruder , 2018, Autom. Control. Comput. Sci..
[5] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[6] Naomi Ehrich Leonard,et al. IEEE Transactions on Control of Network Systems , 2018, IEEE Transactions on Control of Network Systems.
[7] Sridhar Adepu,et al. A Dataset to Support Research in the Design of Secure Water Treatment Systems , 2016, CRITIS.
[8] Greg Welch,et al. An Introduction to Kalman Filter , 1995, SIGGRAPH 2001.
[9] Yonghui Wang,et al. Cyber-Physical Systems: A Literature Review , 2017 .
[10] Siddhartha Kumar Khaitan,et al. Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.
[11] Wei Yu,et al. On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.
[12] Valentino Constantinou,et al. Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding , 2018, KDD.
[13] Dmitry P. Zegzhda,et al. Digital Manufacturing Security Indicators , 2018, Autom. Control. Comput. Sci..
[14] Jiming Chen,et al. Secure Kalman Filter State Estimation by Partially Homomorphic Encryption , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).
[15] Maria A. Poltavtseva,et al. Problems of Security in Digital Production and Its Resistance to Cyber Threats , 2018, Autom. Control. Comput. Sci..
[16] Maxim O. Kalinin,et al. Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters , 2015, Automatic Control and Computer Sciences.
[17] Peter D. Zegzhda,et al. Detecting Android application malicious behaviors based on the analysis of control flows and data flows , 2017, SIN.
[18] Nick Feamster,et al. Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[19] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.