Design of data-injection attacks for cyber-physical systems based on Kullback-Leibler divergence
暂无分享,去创建一个
[1] Lihui Wang,et al. Current status and advancement of cyber-physical systems in manufacturing , 2015 .
[2] Jian Sun,et al. Optimal Data Injection Attacks in Cyber-Physical Systems , 2018, IEEE Transactions on Cybernetics.
[3] Ruochi Zhang,et al. Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.
[4] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[5] Daqiang Zhang,et al. Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions , 2014, IEEE Communications Magazine.
[6] Hsiao-Hwa Chen,et al. Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges , 2014, IEEE Systems Journal.
[7] Edward A. Lee,et al. Modeling Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[8] Edward A. Lee. The Past, Present and Future of Cyber-Physical Systems: A Focus on Models , 2015, Sensors.
[9] Chao Yang,et al. DoS attack in centralised sensor network against state estimation , 2018, IET Control Theory & Applications.
[10] Bruce M. McMillin,et al. Analysis of information flow security in cyber-physical systems , 2010, Int. J. Crit. Infrastructure Prot..
[11] Martine Chlela,et al. Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks , 2018, IEEE Transactions on Smart Grid.
[12] Xiaofeng Wang,et al. Networked Strong Tracking Filtering with Multiple Packet Dropouts: Algorithms and Applications , 2014, IEEE Transactions on Industrial Electronics.
[13] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[14] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[15] Fuad E. Alsaadi,et al. A New Look at Boundedness of Error Covariance of Kalman Filtering , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[16] Xin Huang,et al. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks , 2018, IEEE Transactions on Cybernetics.
[17] Xinwen Fu,et al. A New Replay Attack Against Anonymous Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[18] Donghua Zhou,et al. Incipient sensor fault isolation based on augmented Mahalanobis distance , 2019, Control Engineering Practice.
[19] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[20] Donghua Zhou,et al. Robust Fault Detection for Networked Systems with Distributed Sensors , 2011, IEEE Transactions on Aerospace and Electronic Systems.
[21] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[22] Changyun Wen,et al. Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .
[23] Ping Zhang,et al. Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).
[24] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[25] Daniel W. C. Ho,et al. Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.
[26] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[27] Peng Huang,et al. A denial-of-service attack on fiber-based continuous-variable quantum key distribution , 2018, Physics Letters A.
[28] Changyin Sun,et al. Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems , 2018, Neurocomputing.
[29] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[30] Pierluigi Pisu,et al. Resilient control strategy under Denial of Service in connected vehicles , 2017, 2017 American Control Conference (ACC).
[31] Donghua Zhou,et al. Exponential Smoothing Reconstruction Approach for Incipient Fault Isolation , 2018 .
[32] Donghua Zhou,et al. Leakage Fault Diagnosis for an Internet-Based Three-Tank System: An Experimental Study , 2012, IEEE Transactions on Control Systems Technology.
[33] Xin Huang,et al. Adaptive integral sliding‐mode control strategy of data‐driven cyber‐physical systems against a class of actuator attacks , 2018, IET Control Theory & Applications.
[34] Yuanqing Xia,et al. Security estimation under Denial-of-Service attack with energy constraint , 2018, Neurocomputing.
[35] Yurong Liu,et al. Stability Analysis of Covariance Intersection-Based Kalman Consensus Filtering for Time-Varying Systems , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[36] David K. Y. Yau,et al. Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[37] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[38] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.
[39] Ali Davoudi,et al. Detection of False-Data Injection Attacks in Cyber-Physical DC Microgrids , 2017, IEEE Transactions on Industrial Informatics.
[40] Jay Lee,et al. A Cyber-Physical Systems architecture for Industry 4.0-based manufacturing systems , 2015 .
[41] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[42] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[43] Qing-Long Han,et al. A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.
[44] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[45] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[46] Theodore Tryfonas,et al. A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..
[47] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.