Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems
暂无分享,去创建一个
[1] Edward J. Sondik,et al. The Optimal Control of Partially Observable Markov Processes over the Infinite Horizon: Discounted Costs , 1978, Oper. Res..
[2] Kevin M. Carter,et al. Balancing Security and Performance for Agility in Dynamic Threat Environments , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[3] E. Steyerberg,et al. [Regression modeling strategies]. , 2011, Revista espanola de cardiologia.
[4] Mo-Yuen Chow,et al. Optimal Tradeoff Between Performance and Security in Networked Control Systems Based on Coevolutionary Algorithms , 2012, IEEE Transactions on Industrial Electronics.
[5] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[6] Rajarathnam Chandramouli,et al. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks , 2007, IEEE Transactions on Dependable and Secure Computing.
[7] Keng Peng Tee,et al. Role adaptation of human and robot in collaborative tasks , 2015, 2015 IEEE International Conference on Robotics and Automation (ICRA).
[8] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[9] David Mascareñas,et al. A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.
[10] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[11] Peter Schartner,et al. Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[12] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[13] Matt Ratto,et al. Materializing information: 3D printing and social change , 2012, First Monday.
[14] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.
[15] Quanyan Zhu,et al. Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).
[16] Quanyan Zhu,et al. An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.
[17] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[18] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[19] Sunil J Rao,et al. Regression Modeling Strategies: With Applications to Linear Models, Logistic Regression, and Survival Analysis , 2003 .
[20] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[21] Vikram Krishnamurthy,et al. Partially observed Markov decision processes (POMDPs) , 2016 .
[22] Quanyan Zhu,et al. A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).