Undetectable sensor and actuator attacks for observer based controlled Cyber-Physical Systems
暂无分享,去创建一个
[1] Steve Goddard,et al. Cyber-physical systems in industrial process control , 2008, SIGBED.
[2] Jason A. Laska,et al. A mathematical framework for the analysis of cyber-resilient control systems , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[3] Siddhartha Kumar Khaitan,et al. Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.
[4] Insup Lee,et al. Medical Cyber Physical Systems , 2010, Design Automation Conference.
[5] Chen-Khong Tham,et al. Participatory Cyber Physical System in Public Transport Application , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.
[6] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[7] Juan Pablo Conti,et al. The day the samba stopped , 2010 .
[8] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[9] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[10] F. Bullo Ucsb,et al. Attack Detection and Identification in Cyber-Physical Systems , 2012 .
[11] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[12] Jan Kleissl,et al. Cyber-physical energy systems: Focus on smart buildings , 2010, Design Automation Conference.
[13] Jin Dong,et al. Finite energy and bounded actuator attacks on cyber-physical systems , 2015, 2015 European Control Conference (ECC).
[14] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[15] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[16] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[17] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[18] Jin Dong,et al. Finite energy and bounded attacks on control system sensor signals , 2014, 2014 American Control Conference.
[19] Uwe Baumgarten,et al. A Model for Sequence Based Power Management in Cyber Physical Systems , 2011, ICT-GLOW.
[20] Guoliang Xing,et al. Fidelity-Aware Utilization Control for Cyber-Physical Surveillance Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[21] Wenjun Xu,et al. A Cyber-Physical System for Public Environment Perception and Emergency Handling , 2011, 2011 IEEE International Conference on High Performance Computing and Communications.
[22] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.