On content modification attacks in bilateral teleoperation systems
暂无分享,去创建一个
[1] Romeo Ortega,et al. Position Tracking for Non-linear Teleoperators with Variable Time Delay , 2009, Int. J. Robotics Res..
[2] Prasant Mohapatra,et al. Stealthy attacks meets insider threats: A three-player game model , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[3] Ehab Al-Shaer,et al. On secure and resilient telesurgery communications over unreliable networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[4] Rogelio Lozano,et al. Synchronization of bilateral teleoperators with time delay , 2008, Autom..
[5] R. P. Paul,et al. A Symbolic Teleoperator Interface For Time-delayed Underwater Robot Manipulation , 1991, OCEANS 91 Proceedings.
[6] Wang Wei,et al. Teleoperated manipulator for leak detection of sealed radioactive sources , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.
[7] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[8] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[9] Tamara Bonaci,et al. Surgical Telerobotics Meets Information Security , 2012 .
[10] Sonia Martínez,et al. On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[11] M. Spong,et al. Robot Modeling and Control , 2005 .
[12] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[13] Masaru Uchiyama,et al. Model-based space robot teleoperation of ETS-VII manipulator , 2004, IEEE Transactions on Robotics and Automation.
[14] S. Shankar Sastry,et al. Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.
[15] Mark W. Spong,et al. Bilateral teleoperation: An historical survey , 2006, Autom..
[16] Masayuki Fujita,et al. Passivity-Based Control and Estimation in Networked Robotics , 2015 .
[17] Bhavani M. Thuraisingham,et al. Cyberphysical systems security applied to telesurgical robotics , 2012, Comput. Stand. Interfaces.