A Security Architecture in Cyber-Physical Systems: Security Theories, Analysis, Simulation and Application Fields
暂无分享,去创建一个
Yang Li | Tianbo Lu | Lingling Zhao | Yong Peng | Jiaxi Lin | Tianbo Lu | Yong Peng | Yang Li | Lingling Zhao | Jiaxi Lin
[1] M. Govindarasu,et al. Cyber vulnerability disclosure policies for the smart grid , 2012, 2012 IEEE Power and Energy Society General Meeting.
[2] Kaiyu Wan,et al. Dependable Context-Sensitive Services in Cyber Physical Systems , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[3] Sandeep K. S. Gupta,et al. Cyber Physical Security Solutions for Pervasive Health Monitoring Systems , 2012 .
[4] Paulo Tabuada,et al. Towards synthesis of platform-aware attack-resilient control systems: extended abstract , 2013, HiCoNS '13.
[5] Yuan Xue,et al. Systematic analysis of cyber-attacks on CPS-evaluating applicability of DFD-based approach , 2012, 2012 5th International Symposium on Resilient Control Systems.
[6] G. Manimaran,et al. Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[7] R. Poovendran,et al. Cyber-physical integration in future aviation information systems , 2012, 2012 IEEE/AIAA 31st Digital Avionics Systems Conference (DASC).
[8] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[9] Insup Lee,et al. Challenges and Research Directions in Medical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[10] Insup Lee,et al. Model-Driven Safety Analysis of Closed-Loop Medical Systems , 2014, IEEE Transactions on Industrial Informatics.
[11] Goro Fujita,et al. Power system stabilizing control using variable series capacitor based on H/sup /spl infin// control theory considering AVR and governor , 1997, CCECE '97. Canadian Conference on Electrical and Computer Engineering. Engineering Innovation: Voyage of Discovery. Conference Proceedings.
[12] Wang Chunlei,et al. Dynamically validate network security based on adaptive control theory , 2013 .
[13] Sandeep K. S. Gupta,et al. Toward autonomous vehicle safety verification from mobile cyber-physical systems perspective , 2011, SIGBED.
[14] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[15] Liviu Miclea,et al. About dependability in cyber-physical systems , 2011, 2011 9th East-West Design & Test Symposium (EWDTS).
[16] Yuan Xue,et al. Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.
[17] Aditya Ashok,et al. A cyber-physical security testbed for smart grid: system architecture and studies , 2011, CSIIRW '11.
[18] Insup Lee,et al. Security and Interoperable-Medical-Device Systems, Part 1 , 2012, IEEE Security & Privacy.
[19] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[20] Bruce M. McMillin,et al. Verifying Noninterference in a Cyber-Physical System The Advanced Electric Power Grid , 2007 .
[21] Zhen Li,et al. HARDWARE-IN-THE-LOOP SIMULATION , 2004 .
[22] Ángel Zufía,et al. Mathematical Simulation and Controlled Cooling in an EDC Conveyor of a Wire Rod Rolling Mill , 2001 .
[23] David Woods,et al. Resilience Engineering: Concepts and Precepts , 2006 .
[24] Francesco Bullo,et al. Secure control systems: a control-theoretic approach to cyber-physical security , 2012 .
[25] Zdzislaw Bubnicki,et al. Modern Control Theory , 2005 .
[26] Edward A. Lee. Computing Foundations and Practice for Cyber- Physical Systems: A Preliminary Report , 2007 .
[27] Ayan Banerjee,et al. Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems , 2012, Proceedings of the IEEE.
[28] Goro Shirai,et al. Power System Stabilizing Control Using Variable Series Capacitor Based on H_∞ Control Theory Considering AVR and GOV , 1996 .
[29] Edward A. Lee. Cyber-physical Systems -are Computing Foundations Adequate? Position Paper for Nsf Workshop on Cyber-physical Systems: Research Motivation, Techniques and Roadmap , 1998 .
[30] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[31] Al-Sakib Khan Pathan,et al. A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques , 2011, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE).
[32] Krishna K. Venkatasubramanian,et al. Security solutions for cyber-physical systems , 2009 .
[33] Insup Lee,et al. Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification , 2012, IEEE Security & Privacy.
[34] F. Bullo,et al. A graph-theoretical characterization of power network vulnerabilities , 2011, Proceedings of the 2011 American Control Conference.
[35] G. Manimaran,et al. PENET: A practical method and tool for integrated modeling of security attacks and countermeasures , 2009, Comput. Secur..
[36] Ayan Banerjee,et al. Towards modeling and analysis of cyber-physical medical systems , 2011, ISABEL '11.
[37] Ayan Banerjee,et al. Hybrid simulator for cyber-physical energy systems , 2013, 2013 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).
[38] Ruggero Carli,et al. Distributed estimation via iterative projections with application to power network monitoring , 2011, Autom..
[39] Zhihao Jiang,et al. Cyber–Physical Modeling of Implantable Cardiac Medical Devices , 2012, Proceedings of the IEEE.
[40] Tansu Alpcan,et al. Network Security , 2010 .
[41] Lui Sha,et al. A framework for the safe interoperability of medical devices in the presence of network failures , 2010, ICCPS '10.
[42] Chen-Ching Liu,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees , 2007, 2007 IEEE Power Engineering Society General Meeting.
[43] Edward A. Lee,et al. Addressing Modeling Challenges in Cyber-Physical Systems , 2011 .
[44] Bernhard Plattner,et al. Network resilience: a systematic approach , 2011, IEEE Communications Magazine.
[45] G. Manimaran,et al. Application of Sensor Network for Secure Electric Energy Infrastructure , 2007, IEEE Transactions on Power Delivery.
[46] Bjarne E. Helvik,et al. A survey of resilience differentiation frameworks in communication networks , 2007, IEEE Communications Surveys & Tutorials.
[47] S. Shankar Sastry,et al. A Taxonomy of Cyber Attacks on SCADA Systems , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[48] G. Manimaran,et al. Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.
[49] Adrian Perrig,et al. Don't Sweat Your Privacy Using Humidity to Detect Human Presence , 2007 .
[50] Lu Feng,et al. Assuring the safety of on-demand medical cyber-physical systems , 2013, 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).
[51] Yue Zhao,et al. Fundamental limits of cyber-physical security in smart power grids , 2013, 52nd IEEE Conference on Decision and Control.
[52] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[53] A. Bouscayrol,et al. Different types of Hardware-In-the-Loop simulation for electric drives , 2008, 2008 IEEE International Symposium on Industrial Electronics.
[54] Xiaoqing Frank Liu,et al. Verifying Noninterference in a Cyber-Physical System The Advanced Electric Power Grid , 2007, Seventh International Conference on Quality Software (QSIC 2007).
[55] Chen-Ching Liu,et al. Cyber-vulnerability of power grid monitoring and control systems , 2008, CSIIRW '08.
[56] Andrew J. Kornecki,et al. Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[57] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[58] Soo Dong Kim,et al. A Service-Based Approach to Designing Cyber Physical Systems , 2010, 2010 IEEE/ACIS 9th International Conference on Computer and Information Science.
[59] Neeraj Suri,et al. A control theory approach for analyzing the effects of data errors in safety-critical control systems , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..
[60] Rolf Isermann,et al. Hardware-in-the-loop simulation for the design and testing of engine-control systems , 1998 .
[61] K. Venkatasubramanian,et al. Ayushman: a secure, usable pervasive health monitoring system , 2008, HealthNet '08.
[62] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[63] Maciej J. Zawodniok,et al. Stability of a Cyber-physical Smart Grid System Using Cooperating Invariants , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.
[64] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[65] Ayan Banerjee,et al. Model Based Safety Analysis and Verification of Cyber-Physical Systems , 2012 .
[66] Ayan Banerjee,et al. Spatio-temporal hybrid automata for safe cyber-physical systems: A medical case study , 2013, 2013 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[67] Toshiaki Itoh,et al. Future needs for control theory in industry-report of the control technology survey in Japanese industry , 1999, IEEE Trans. Control. Syst. Technol..
[68] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[69] Jong-Ho Lee,et al. Detection of replay attacks in smart grid systems , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).
[70] Michael Steurer,et al. A Megawatt-Scale Power Hardware-in-the-Loop Simulation Setup for Motor Drives , 2010, IEEE Transactions on Industrial Electronics.
[71] Quanyan Zhu,et al. Game-theoretic methods for security and resilience in cyber-physical systems , 2013 .
[72] Suman Nath,et al. On Bounding Data Stream Privacy in Distributed Cyber-physical Systems , 2010, 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing.
[73] Radha Poovendran,et al. Aviation Cyber–Physical Systems: Foundations for Future Aircraft and Air Transport , 2013, Proceedings of the IEEE.
[74] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[75] Sahra Sedigh Sarvestani,et al. Integrated Cyber-Physical Fault Injection for Reliability Analysis of the Smart Grid , 2010, SAFECOMP.
[76] Siddharth Sridhar,et al. Development of the PowerCyber SCADA security testbed , 2010, CSIIRW '10.