Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks
暂无分享,去创建一个
[1] Deepa Kundur,et al. A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.
[2] Michel Kinnaert,et al. Diagnosis and Fault-Tolerant Control , 2004, IEEE Transactions on Automatic Control.
[3] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[4] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[5] Virgil D. Gligor. A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.
[6] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[7] A. Willsky,et al. Failure detection and identification , 1989 .
[8] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[9] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[10] Claire J. Tomlin,et al. Sparse network identifiability via Compressed Sensing , 2016, Autom..
[11] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[12] J. Doyle,et al. Essentials of Robust Control , 1997 .
[13] Shaun M. Fallat,et al. Totally Nonnegative Matrices , 2011 .
[14] Allen Y. Yang,et al. Fast ℓ1-minimization algorithms and an application in robust face recognition: A review , 2010, 2010 IEEE International Conference on Image Processing.
[15] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[16] Rémi Gribonval,et al. Sparse representations in unions of bases , 2003, IEEE Trans. Inf. Theory.
[17] Jean C. Walrand,et al. Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach , 2012, GAMENETS.
[18] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[19] Michael Elad,et al. A generalized uncertainty principle and sparse representation in pairs of bases , 2002, IEEE Trans. Inf. Theory.
[20] Margreta Kuijper,et al. Characterising the vulnerability of linear control systems under sensor attacks using a system's security index , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[21] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[22] Jorge Goncalves,et al. Compressed Sensing for Network Reconstruction , 2014 .
[23] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[24] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[25] Colin R. Goodall,et al. 13 Computation using the QR decomposition , 1993, Computational Statistics.
[26] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[27] Fei Hu,et al. Combating False Data Injection Attacks in Smart Grid using Kalman Filter , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[28] Cheolhyeon Kwon,et al. Hybrid robust controller design: Cyber attack attenuation for Cyber-Physical Systems , 2013, 52nd IEEE Conference on Decision and Control.
[29] Joel A. Tropp,et al. Greed is good: algorithmic results for sparse approximation , 2004, IEEE Transactions on Information Theory.
[30] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[31] Michael Elad,et al. Optimally sparse representation in general (nonorthogonal) dictionaries via ℓ1 minimization , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[32] Dan Kalman,et al. The Generalized Vandermonde Matrix , 1984 .
[33] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[34] Patrick Bouffard,et al. On-board Model Predictive Control of a Quadrotor Helicopter: Design, Implementation, and Experiments , 2012 .
[35] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.