DoS Attack Power Allocation Against Remote State Estimation via a Block Fading Channel
暂无分享,去创建一个
[1] Xunyuan Yin,et al. Resilient Estimation for Networked Systems With Variable Communication Capability , 2016, IEEE Transactions on Automatic Control.
[2] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.
[3] P. Spreij. Probability and Measure , 1996 .
[4] Robert J. Elliott,et al. On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[5] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[6] Peng Cheng,et al. Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks , 2020, IEEE Transactions on Dependable and Secure Computing.
[7] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[8] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[9] Wei Xing Zheng,et al. HMM-Based $\mathcal{H}_{\infty}$ Filtering for Discrete-Time Markov Jump LPV Systems Over Unreliable Communication Channels , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[10] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[11] Heng Zhang,et al. Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks , 2017, Ad Hoc Networks.
[12] Ling Shi,et al. Sensor data scheduling for linear quadratic Gaussian control with full state feedback , 2012, 2012 American Control Conference (ACC).
[13] Lingkun Fu,et al. DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[14] Ling Shi,et al. Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control , 2014, 2014 American Control Conference.
[15] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[16] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[17] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[18] W. Fleming. Book Review: Discrete-time Markov control processes: Basic optimality criteria , 1997 .
[19] Wei Xing Zheng,et al. Distributed Load Sharing Under False Data Injection Attack in an Inverter-Based Microgrid , 2019, IEEE Transactions on Industrial Electronics.
[20] Heng Zhang,et al. Sensor transmission power control in remote state estimation over a fading communication channel , 2018 .
[21] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[22] David P. Fidler,et al. Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.
[23] Dimitrios N. Serpanos,et al. ARMET: Behavior-Based Secure and Resilient Industrial Control Systems , 2018, Proceedings of the IEEE.
[24] Yu Cheng,et al. Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems , 2016, WASA.
[25] Chao Yang,et al. Jamming attack in centralized state estimation , 2015, 2015 34th Chinese Control Conference (CCC).
[26] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[27] Heng Zhang,et al. A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[28] Wei Xing Zheng,et al. Optimum transmission policy for remote state estimation with opportunistic energy harvesting , 2018, Comput. Networks.
[29] Oscar Vega-Amaya,et al. The average cost optimality equation: A fixed point approach , 2003 .
[30] Alejandro Ribeiro,et al. Optimal Power Management in Wireless Control Systems , 2014, IEEE Transactions on Automatic Control.
[31] Jing Sun,et al. Testing and Defending Methods Against DOS Attack in State Estimation , 2017 .
[32] Jiming Chen,et al. Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.
[33] Wei Xing Zheng,et al. Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.
[34] Ling Shi,et al. Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.
[35] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).