A controller design for mitigation of passive system identification attacks in networked control systems
暂无分享,去创建一个
[1] A. Morse. Supervisory control of families of linear set-point controllers Part I. Exact matching , 1996, IEEE Trans. Autom. Control..
[2] Sameer Qazi,et al. Cyber Security Backdrop: A SCADA testbed , 2014, 2014 IEEE Computers, Communications and IT Applications Conference.
[3] Jiadong Wang,et al. Identification of Switched Linear Systems , 2013 .
[4] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[5] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.
[6] Raphael Machado,et al. Covert Attacks in Cyber-Physical Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[7] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[8] A. Morse,et al. Stability of switched systems with average dwell-time , 1999, Proceedings of the 38th IEEE Conference on Decision and Control (Cat. No.99CH36304).
[9] Roy S. Smith,et al. A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .
[10] Y. Tipsuwan,et al. An implementation of a networked PI controller over IP network , 2003, IECON'03. 29th Annual Conference of the IEEE Industrial Electronics Society (IEEE Cat. No.03CH37468).
[11] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[12] A. Michel,et al. Qualitative analysis of discrete-time switched systems , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).
[13] Craig Partridge,et al. Single-packet IP traceback , 2002, TNET.
[14] Hai Lin,et al. Stability and Stabilizability of Switched Linear Systems: A Survey of Recent Results , 2009, IEEE Transactions on Automatic Control.
[15] A. Morse,et al. Basic problems in stability and design of switched systems , 1999 .
[16] Gongpu Wang,et al. Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.
[17] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[18] Antonella Ferrara,et al. Model-based event-triggered control for freeway traffic systems , 2015, 2015 International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP).
[19] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[20] Quang Phuc Ha,et al. Robust Non-Overshoot Time Responses Using Cascade Sliding Mode-PID Control , 2007, J. Adv. Comput. Intell. Intell. Informatics.
[21] Y. Tipsuwan,et al. Network-based control systems: a tutorial , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).
[22] Antonella Ferrara,et al. A switched ramp-metering controller for freeway traffic systems , 2015, ADHS.
[23] Gideon Paul Caplovitz,et al. Form features provide a cue to the angular velocity of rotating objects. , 2014, Journal of experimental psychology. Human perception and performance.
[24] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[25] Pinar Çivicioglu,et al. Backtracking Search Optimization Algorithm for numerical optimization problems , 2013, Appl. Math. Comput..
[26] Rajesh Singh,et al. Wireless Controlled Intelligent Heating System Using HPSO , 2015 .
[27] Zhiliang Wang,et al. Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model , 2013 .
[28] Mo-Yuen Chow,et al. Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.
[29] Manoj Kumar,et al. Networked Control of a Large Pressurized Heavy Water Reactor (PHWR) With Discrete Proportional-Integral-Derivative (PID) Controllers , 2013, IEEE Transactions on Nuclear Science.
[30] M. El-Sharkawi,et al. Variable Structure Tracking of DC Motor for High Performance Applications , 1989, IEEE Power Engineering Review.
[31] Shin'ya Nishida,et al. Advancement of motion psychophysics: review 2001-2010. , 2011, Journal of vision.
[32] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[33] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[34] Joe H. Chow,et al. Stability of an adaptive switched controller for power system oscillation damping using remote synchrophasor signals , 2014, 53rd IEEE Conference on Decision and Control.
[35] Punit Sharma,et al. A Taxonomy of Physical Layer Attacks in MANET , 2015 .
[36] Yuanqing Xia,et al. Recent progress in networked control systems — A survey , 2015, International Journal of Automation and Computing.
[37] Alan Oliveira de Sá,et al. Bio-inspired Active Attack for Identification of Networked Control Systems , 2017 .
[38] Robin J. Evans,et al. Stability results for switched controller systems , 1999, Autom..