An Analysis of Cyber Physical System Security Theories
暂无分享,去创建一个
Yang Li | Tianbo Lu | Yong Peng | Lingling Zhao | Jiaxi Lin | Tianbo Lu | Yong Peng | Yang Li | Lingling Zhao | Jiaxi Lin
[1] David Woods,et al. Resilience Engineering: Concepts and Precepts , 2006 .
[2] Francesco Bullo,et al. Secure control systems: a control-theoretic approach to cyber-physical security , 2012 .
[3] Goro Fujita,et al. Power system stabilizing control using variable series capacitor based on H/sup /spl infin// control theory considering AVR and governor , 1997, CCECE '97. Canadian Conference on Electrical and Computer Engineering. Engineering Innovation: Voyage of Discovery. Conference Proceedings.
[4] Bernhard Plattner,et al. Network resilience: a systematic approach , 2011, IEEE Communications Magazine.
[5] Ayan Banerjee,et al. Model Based Safety Analysis and Verification of Cyber-Physical Systems , 2012 .
[6] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[7] Andrew J. Kornecki,et al. Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[8] Krishna K. Venkatasubramanian,et al. Security solutions for cyber-physical systems , 2009 .
[9] Suman Nath,et al. On Bounding Data Stream Privacy in Distributed Cyber-physical Systems , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.
[10] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[11] Toshiaki Itoh,et al. Future needs for control theory in industry-report of the control technology survey in Japanese industry , 1999, IEEE Trans. Control. Syst. Technol..
[12] Adrian Perrig,et al. Don't Sweat Your Privacy Using Humidity to Detect Human Presence , 2007 .
[13] Neeraj Suri,et al. A control theory approach for analyzing the effects of data errors in safety-critical control systems , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..
[14] Bjarne E. Helvik,et al. A survey of resilience differentiation frameworks in communication networks , 2007, IEEE Communications Surveys & Tutorials.
[15] Sandeep K. S. Gupta,et al. Cyber Physical Security Solutions for Pervasive Health Monitoring Systems , 2012 .