暂无分享,去创建一个
[1] Jiafu Wan,et al. A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory , 2019, IEEE Transactions on Industrial Informatics.
[2] Y. Benjamini,et al. THE CONTROL OF THE FALSE DISCOVERY RATE IN MULTIPLE TESTING UNDER DEPENDENCY , 2001 .
[3] Zhao Yang Dong,et al. Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks , 2019, IEEE Transactions on Smart Grid.
[4] M. A. Athans,et al. The role and use of the stochastic linear-quadratic-Gaussian problem in control system design , 1971 .
[5] Paritosh Ramanan,et al. BAFFLE : Blockchain Based Aggregator Free Federated Learning , 2020, 2020 IEEE International Conference on Blockchain (Blockchain).
[6] Joe Weiss. Aurora generator test , 2016 .
[7] Paritosh Ramanan,et al. Deep Learning Based Covert Attack Identification for Industrial Control Systems , 2020, 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA).
[8] Dong-Ho Kang,et al. Cyber threats and defence approaches in SCADA systems , 2014, 16th International Conference on Advanced Communication Technology.
[9] Henrik Sandberg,et al. Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.
[10] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[11] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[12] Michael Mylrea,et al. Blockchain: A path to grid modernization and cyber resiliency , 2017, 2017 North American Power Symposium (NAPS).
[13] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[14] Frank Kargl,et al. Specification Mining for Intrusion Detection in Networked Control Systems , 2016, USENIX Security Symposium.
[15] Petros G. Voulgaris,et al. On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..
[16] Nagi Gebraeel,et al. Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems , 2021, IEEE Transactions on Automation Science and Engineering.
[17] John S. Heidemann,et al. Privacy Principles for Sharing Cyber Security Data , 2015, 2015 IEEE Security and Privacy Workshops.
[18] Hongtao Sun,et al. A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[19] Max Mühlhäuser,et al. Towards Blockchain-Based Collaborative Intrusion Detection Systems , 2017, CRITIS.
[20] Md. Apel Mahmud,et al. Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.
[21] Anand D. Sarwate,et al. Broadcast Gossip Algorithms for Consensus , 2009, IEEE Transactions on Signal Processing.
[22] Gaetano Zizzo,et al. A Technical Approach to the Energy Blockchain in Microgrids , 2018, IEEE Transactions on Industrial Informatics.
[23] Stephen P. Boyd,et al. Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.
[24] Ricard V. Solé,et al. Topological Vulnerability of the European Power Grid under Errors and Attacks , 2007, Int. J. Bifurc. Chaos.
[25] Bharadwaj Satchidanandan,et al. An Online Detection Framework for Cyber Attacks on Automatic Generation Control , 2017, IEEE Transactions on Power Systems.
[26] Vito Latora,et al. Modeling cascading failures in the North American power grid , 2005 .
[27] Mianxiong Dong,et al. Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[28] Shuai Wang,et al. Blockchain-Enabled Smart Contracts: Architecture, Applications, and Future Trends , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[29] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[30] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[31] Robert Radvanovsky,et al. Handbook of SCADA/control systems security , 2013 .
[32] Sandip C. Patel,et al. Securing SCADA systems , 2008, Inf. Manag. Comput. Secur..
[33] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.