Switching for Unpredictability: A Proactive Defense Control Approach
暂无分享,去创建一个
[1] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[2] Jin Jiang,et al. Hybrid Fault-Tolerant Flight Control System Design Against Partial Actuator Failures , 2012, IEEE Transactions on Control Systems Technology.
[3] Daniel P. Shepard,et al. Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .
[4] Scott A. DeLoach,et al. Towards a Theory of Moving Target Defense , 2014, MTD '14.
[5] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[6] Neal Leavitt,et al. Researchers Fight to Keep Implanted Medical Devices Safe from Hackers , 2010, Computer.
[7] Midori Maki,et al. A stability guaranteed active fault‐tolerant control system against actuator failures , 2004 .
[8] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[9] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[10] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[11] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[12] Guido Herrmann,et al. Adaptive optimal observer design via approximate dynamic programming , 2017, 2017 American Control Conference (ACC).
[13] Daniel Liberzon,et al. Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.
[14] A. Morse,et al. Stability of switched systems with average dwell-time , 1999, Proceedings of the 38th IEEE Conference on Decision and Control (Cat. No.99CH36304).
[15] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[16] A. Michel,et al. Stability analysis of switched systems with stable and unstable subsystems: an average dwell time approach , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).
[17] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[18] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[19] M. Mariton,et al. Jump Linear Systems in Automatic Control , 1992 .
[20] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[21] Joseph G. Tront,et al. MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Insup Lee,et al. Medical Cyber Physical Systems , 2010, Design Automation Conference.
[24] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[25] Bruno Sinopoli,et al. Detecting integrity attacks on control systems using a moving target approach , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[26] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.