Covert Misappropriation of Networked Control Systems

[1]  Evanghelos Zafiriou,et al.  Robust process control , 1987 .

[2]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[3]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[4]  Karl Henrik Johansson,et al.  Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements , 2014, IEEE Transactions on Smart Grid.

[5]  Roy S. Smith,et al.  A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems , 2011 .

[6]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[7]  Vicenç Puig,et al.  MIMO Smith predictor: Global and structured robust performance analysis , 2009 .

[8]  Jianguo Zhou,et al.  Global speed control of separately excited DC motor , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).

[9]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[10]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[11]  S. Bolognani,et al.  Design of a flux weakening control scheme for DC motor drives featuring full voltage operation , 2008, 2008 43rd International Universities Power Engineering Conference.

[12]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[13]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[14]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .