Optimal switching integrity attacks in cyber-physical systems
暂无分享,去创建一个
[1] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[2] Ali Heydari,et al. Optimal Switching and Control of Nonlinear Switching Systems Using Approximate Dynamic Programming , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[3] Wenjie Lu,et al. A Hybrid-Adaptive Dynamic Programming Approach for the Model-Free Control of Nonlinear Switched Systems , 2016, IEEE Transactions on Automatic Control.
[4] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[5] Andrey V. Savkin,et al. Set-Valued State Estimation and Attack Detection for Uncertain Descriptor Systems , 2013, IEEE Signal Processing Letters.
[6] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.
[7] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[8] Panos J. Antsaklis,et al. Optimal control of switched systems based on parameterization of the switching instants , 2004, IEEE Transactions on Automatic Control.
[9] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[10] Xuping Xu,et al. Optimal control of switched systems: new results and open problems , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).
[11] Raymond A. DeCarlo,et al. Optimal control of switching systems , 2005, Autom..
[12] Ling Shi,et al. Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.
[13] Paulo Tabuada,et al. Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[14] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[15] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[16] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.