False Data Injection Attacks in Control Systems
暂无分享,去创建一个
[1] Richard Vernon Beard,et al. Failure accomodation in linear systems through self-reorganization. , 1971 .
[2] Harold Lee Jones,et al. Failure detection in linear systems , 1973 .
[3] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[4] A. Willsky,et al. A generalized likelihood ratio approach to the detection and estimation of jumps in linear systems , 1976 .
[5] R. Stengel,et al. Technical notes and correspondence: Stochastic robustness of linear time-invariant control systems , 1991 .
[6] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[7] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[8] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[9] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[10] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[11] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[12] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.