A Controllable False Data Injection Attack for a Cyber Physical System
暂无分享,去创建一个
[1] Siu-Ming Yiu,et al. Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[2] Bobbi Jo Broxson. The Kronecker Product , 2006 .
[3] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[4] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[5] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[6] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[7] Raphael Machado,et al. Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[8] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[9] Biyun Chen,et al. Real-Time Identification of False Data Injection Attacks: A Novel Dynamic-Static Parallel State Estimation Based Mechanism , 2019, IEEE Access.
[10] L. El Ghaoui,et al. Synthesis of fixed-structure controllers via numerical optimization , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.
[11] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[12] Bin Jiang,et al. Multiple incipient sensor faults diagnosis with application to high-speed railway traction devices. , 2017, ISA transactions.
[13] Bin Jiang,et al. Incipient winding fault detection and diagnosis for squirrel-cage induction motors equipped on CRH trains. , 2020, ISA transactions.
[14] Yugang Niu,et al. Finite-Time Sliding-Mode Control of Markovian Jump Cyber-Physical Systems Against Randomly Occurring Injection Attacks , 2020, IEEE Transactions on Automatic Control.
[15] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[16] Zidong Wang,et al. Event-based security control for discrete-time stochastic systems , 2016 .
[17] Ping Zhang,et al. Detection of covert attacks on cyber-physical systems by extending the system dynamics with an auxiliary system , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[18] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[19] Jean-Christophe Bourin. Matrix versions of some classical inequalities , 2006 .
[20] Michael G. Safonov. Data-Driven Robust Control Design: Unfalsified Control , 2003 .
[21] Yuanyuan Wang,et al. Online Generative Adversary Network Based Measurement Recovery in False Data Injection Attacks: A Cyber-Physical Approach , 2020, IEEE Transactions on Industrial Informatics.
[22] Xiao-Heng Chang,et al. Estimation for a Class of Parameter-Controlled Tunnel Diode Circuits , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[23] Deepa Kundur,et al. Implementing a real-time cyber-physical system test bed in RTDS and OPNET , 2014, 2014 North American Power Symposium (NAPS).
[24] Mohammad Sayad Haghighi,et al. Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control , 2019, 2019 IEEE International Conference on Industrial Technology (ICIT).
[25] Tirza Routtenberg,et al. Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing , 2018, IEEE Systems Journal.
[26] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[27] Xiao-Heng Chang,et al. Fuzzy Peak-to-Peak Filtering for Networked Nonlinear Systems With Multipath Data Packet Dropouts , 2019, IEEE Transactions on Fuzzy Systems.
[28] Shihua Li,et al. Prescribed-Time Second-Order Sliding Mode Controller Design Subject to Mismatched Term , 2017, IEEE Transactions on Circuits and Systems II: Express Briefs.
[29] Massimo Franceschetti,et al. Learning-based attacks in cyber-physical systems. , 2018 .
[30] Parv Venkitasubramaniam,et al. Information-Theoretic Security in Stochastic Control Systems , 2015, Proceedings of the IEEE.