Modification of Recursive Kalman Filter Algorithm for Adaptive Prediction of Cyber Resilience for Industrial Systems

[1]  Igor Kotenko,et al.  Applying Artificial Intelligence Methods to Network Attack Detection , 2018, AI in Cybersecurity.

[2]  Max Donath,et al.  American Control Conference , 1993 .

[3]  Dmitry A. Moskvin,et al.  Hierarchical approach to analyzing security breaches in information systems , 2017, Automatic Control and Computer Sciences.

[4]  Maria A. Poltavtseva,et al.  A Distributed Intrusion Detection System with Protection from an Internal Intruder , 2018, Autom. Control. Comput. Sci..

[5]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[6]  Naomi Ehrich Leonard,et al.  IEEE Transactions on Control of Network Systems , 2018, IEEE Transactions on Control of Network Systems.

[7]  Sridhar Adepu,et al.  A Dataset to Support Research in the Design of Secure Water Treatment Systems , 2016, CRITIS.

[8]  Greg Welch,et al.  An Introduction to Kalman Filter , 1995, SIGGRAPH 2001.

[9]  Yonghui Wang,et al.  Cyber-Physical Systems: A Literature Review , 2017 .

[10]  Siddhartha Kumar Khaitan,et al.  Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.

[11]  Wei Yu,et al.  On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.

[12]  Valentino Constantinou,et al.  Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding , 2018, KDD.

[13]  Dmitry P. Zegzhda,et al.  Digital Manufacturing Security Indicators , 2018, Autom. Control. Comput. Sci..

[14]  Jiming Chen,et al.  Secure Kalman Filter State Estimation by Partially Homomorphic Encryption , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).

[15]  Maria A. Poltavtseva,et al.  Problems of Security in Digital Production and Its Resistance to Cyber Threats , 2018, Autom. Control. Comput. Sci..

[16]  Maxim O. Kalinin,et al.  Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters , 2015, Automatic Control and Computer Sciences.

[17]  Peter D. Zegzhda,et al.  Detecting Android application malicious behaviors based on the analysis of control flows and data flows , 2017, SIN.

[18]  Nick Feamster,et al.  Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[19]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.