Resilient Reinforcement in Secure State Estimation Against Sensor Attacks With A Priori Information
暂无分享,去创建一个
[1] Paulo Tabuada,et al. Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach , 2014, IEEE Transactions on Automatic Control.
[2] Toru Namerikawa,et al. Consensus-Based Cooperative Formation Control for Multiquadcopter System With Unidirectional Network Connections , 2018 .
[3] Paulo Tabuada,et al. Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.
[4] Claire J. Tomlin,et al. Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems , 2018, IEEE Transactions on Control of Network Systems.
[5] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[6] Eduard Heindl,et al. Understanding the spreading patterns of mobile phone viruses , 2012 .
[7] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[8] Paulo Tabuada,et al. Secure state reconstruction in differentially flat systems under sensor attacks using satisfiability modulo theory solving , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[9] Siddharth Sridhar,et al. Cyber-Physical System Security for the Electric Power Grid Controlinpowersystemsthatmaybevulnerabletosecurityattacksisdiscussedinthis paper as are control loop vulnerabilities, potential impact of disturbances, and several mitigations. , 2012 .
[10] Bhaskar D. Rao,et al. Sparse signal reconstruction from limited data using FOCUSS: a re-weighted minimum norm algorithm , 1997, IEEE Trans. Signal Process..
[11] René Vidal,et al. Block-Sparse Recovery via Convex Optimization , 2011, IEEE Transactions on Signal Processing.
[12] Hyungbo Shim,et al. Enhancement of security against zero dynamics attack via generalized hold , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[13] Toru Namerikawa,et al. On the Vulnerabilities Due to Manipulative Zero-Stealthy Attacks in Cyber-Physical Systems , 2017 .
[14] Toru Namerikawa,et al. Reach Set-based Attack Resilient State Estimation against Omniscient Adversaries , 2018, 2018 Annual American Control Conference (ACC).
[15] Toru Namerikawa,et al. Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives , 2017, 2017 IEEE Conference on Control Technology and Applications (CCTA).
[16] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[17] Insup Lee,et al. Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.
[18] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[19] Bruno Sinopoli,et al. A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems , 2017, IEEE Transactions on Control of Network Systems.
[20] Balas K. Natarajan,et al. Sparse Approximate Solutions to Linear Systems , 1995, SIAM J. Comput..
[21] Marc E. Pfetsch,et al. The Computational Complexity of the Restricted Isometry Property, the Nullspace Property, and Related Concepts in Compressed Sensing , 2012, IEEE Transactions on Information Theory.
[22] Hyungbo Shim,et al. Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach , 2015, 2015 European Control Conference (ECC).
[23] Yilin Mo,et al. Dynamic state estimation in the presence of compromised sensory data , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[24] Michael Elad,et al. Stable recovery of sparse overcomplete representations in the presence of noise , 2006, IEEE Transactions on Information Theory.
[25] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[26] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[27] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[28] Paulo Tabuada,et al. An SMT-based approach to secure state estimation under sensor and actuator attacks , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[29] T. Pultarova,et al. News Briefing: Cyber security - Ukraine grid hack is wake-up call for network operators , 2016 .
[30] Jianfeng Lu,et al. Localization of diffusion sources in complex networks with sparse observations , 2018 .
[31] Insup Lee,et al. Attack-Resilient State Estimation for Noisy Dynamical Systems , 2017, IEEE Transactions on Control of Network Systems.
[32] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[33] Michael Elad,et al. Optimally sparse representation in general (nonorthogonal) dictionaries via ℓ1 minimization , 2003, Proceedings of the National Academy of Sciences of the United States of America.
[34] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[35] Anuradha M. Annaswamy,et al. Adaptive Control of Quadrotor UAVs: A Design Trade Study With Flight Evaluations , 2013, IEEE Transactions on Control Systems Technology.
[36] Emmanuel J. Candès,et al. Decoding by linear programming , 2005, IEEE Transactions on Information Theory.
[37] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[38] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[39] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[40] George J. Pappas,et al. Design and Implementation of Attack-Resilient Cyber-Physical Systems , 2016 .
[41] Paulo Tabuada,et al. Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[42] Gabor Karsai,et al. Toward a Science of Cyber–Physical System Integration , 2012, Proceedings of the IEEE.
[43] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[44] João Pedro Hespanha,et al. Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).