A cyber-physical game framework for secure and resilient multi-agent autonomous systems
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[2] Y. Tipsuwan,et al. Control methodologies in networked control systems , 2003 .
[3] Yvo Desmedt. Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.
[4] Todd E. Humphreys,et al. Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.
[5] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[6] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[7] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[8] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[9] Scott D. Lathrop,et al. Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[10] Quanyan Zhu,et al. Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[11] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[12] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[13] Levente Buttyán,et al. Duqu: Analysis, Detection, and Lessons Learned , 2012 .
[14] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[15] Sencun Zhu,et al. Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification , 2006, SecureComm.
[16] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[17] Manfred Morari,et al. Model predictive control: Theory and practice - A survey , 1989, Autom..
[18] Claudio De Persis,et al. Input-to-state stabilizing MPC for neutrally stable linear systems subject to input constraints , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[19] Sencun Zhu,et al. Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification , 2006, 2006 Securecomm and Workshops.