Tuning Windowed Chi-Squared Detectors for Sensor Attacks
暂无分享,去创建一个
Carlos Murguia | Justin Ruths | R Tunga | Justin Ruths | C. Murguia | R. Tunga | Tunga R
[1] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[2] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[3] Michèle Basseville,et al. Detecting changes in signals and systems - A survey , 1988, Autom..
[4] R. Khan,et al. Sequential Tests of Statistical Hypotheses. , 1972 .
[5] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[6] Charles R. Johnson,et al. Matrix Analysis, 2nd Ed , 2012 .
[7] Nathan van de Wouw,et al. Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .
[8] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[9] Karl Johan Åström,et al. Computer-controlled systems (3rd ed.) , 1997 .
[10] Fredrik Gustafsson,et al. Adaptive filtering and change detection , 2000 .
[11] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[12] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[13] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[14] Carlos Murguia,et al. CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).
[15] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[16] J.J. Gertler,et al. Survey of model-based failure detection and isolation in complex plants , 1988, IEEE Control Systems Magazine.
[17] K. Watanabe,et al. Fault diagnosis in nonlinear chemical processes. Part II. Application to a chemical reactor , 1983 .
[18] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[19] Jie Chen,et al. Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.
[20] Carlos Murguia,et al. Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[21] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[22] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[23] Ling Shi,et al. Detection Against Linear Deception Attacks on Multi-Sensor Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[24] Quanyan Zhu,et al. Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.
[25] Shuang Wu,et al. Optimal innovation-based deception attack on remote state estimation , 2017, 2017 American Control Conference (ACC).
[26] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.