A hybrid stochastic game for secure control of cyber-physical systems
暂无分享,去创建一个
[1] Quanyan Zhu,et al. A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.
[2] James Lam,et al. An LMI approach to design robust fault detection filter for uncertain LTI systems , 2003, Autom..
[3] James Lam,et al. Analysis and Synthesis of Markov Jump Linear Systems With Time-Varying Delays and Partially Known Transition Probabilities , 2008, IEEE Transactions on Automatic Control.
[4] Linda Bushnell,et al. Stability analysis of networked control systems , 1999, Proceedings of the 1999 American Control Conference (Cat. No. 99CH36251).
[5] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[6] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[7] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[8] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[9] Bo Hu,et al. Stability analysis of switched systems with stable and unstable subsystems: An average dwell time approach , 2001, Int. J. Syst. Sci..
[10] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[11] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[12] Paulo Tabuada,et al. Attack-resilient state estimation in the presence of noise , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[13] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[14] Todd E. Humphreys,et al. Detection Strategy for Cryptographic GNSS Anti-Spoofing , 2013, IEEE Transactions on Aerospace and Electronic Systems.
[15] T. Başar,et al. Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .
[16] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[17] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[18] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[19] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[20] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[21] Yishay Mansour,et al. Fast Planning in Stochastic Games , 2000, UAI.
[22] Quanyan Zhu,et al. Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks , 2016, IEEE Transactions on Control of Network Systems.
[23] Tuomas Sandholm,et al. Discretization of Continuous Action Spaces in Extensive-Form Games , 2015, AAMAS.
[24] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.