Data Logic Attack on Heavy-Duty Industrial Manipulators
暂无分享,去创建一个
[1] Enrique Soriano,et al. Quantitative analysis of security in distributed robotic frameworks , 2018, Robotics Auton. Syst..
[2] Sibin Mohan,et al. Protecting Actuators in Safety-Critical IoT Systems from Control Spoofing Attacks , 2019, IoT S&P@CCS.
[3] Xinyan Deng,et al. RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through Control-Guided Testing , 2019, USENIX Security Symposium.
[4] J. Monteuuis. Attacker model for Connected and Automated Vehicles , 2018 .
[5] Peter I. Corke,et al. A Simple and Systematic Approach to Assigning Denavit–Hartenberg Parameters , 2007, IEEE Transactions on Robotics.
[6] George Loukas,et al. Physical indicators of cyber attacks against a rescue robot , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[7] Christian Rossow,et al. MALPITY: Automatic Identification and Exploitation of Tarpit Vulnerabilities in Malware , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[8] Sang-Hwa Kim,et al. Review of Dimension Inhomogeneity in Robotics* , 2019, 2019 16th International Conference on Ubiquitous Robots (UR).
[9] Pierluigi Nuzzo,et al. DoS-Resilient Multi-Robot Temporal Logic Motion Planning , 2019, 2019 International Conference on Robotics and Automation (ICRA).
[10] Waldemar Korzeniowski,et al. Flexibility and Load-Bearing Capacity of Roof Bolting as Functions of Mounting Depth and Hole Diameter , 2019, Energies.
[11] Howard Jay Chizeck,et al. On potential security threats against rescue robotic systems , 2012, 2012 IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR).
[12] Yan Zhang,et al. Command Disaggregation Attack and Mitigation in Industrial Internet of Things , 2017, Sensors.
[13] Davide Quarta,et al. Security of controlled manufacturing systems in the connected factory: the case of industrial robots , 2019, Journal of Computer Virology and Hacking Techniques.
[14] Ryan K. Williams,et al. Approximate Probabilistic Security for Networked Multi-Robot Systems , 2019, 2019 International Conference on Robotics and Automation (ICRA).
[15] Marco Balduzzi,et al. A Security Evaluation of Industrial Radio Remote Controllers , 2019, DIMVA.
[16] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[17] Khalil M. Ahmad Yousef,et al. Analyzing Cyber-Physical Threats on Robotic Platforms † , 2018, Sensors.
[18] V. Elamaran,et al. Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools , 2018, IEEE Access.
[19] Zhiliang Wang,et al. False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..
[20] Fabio Roli,et al. Security Evaluation of Support Vector Machines in Adversarial Environments , 2014, ArXiv.
[21] Max Schreiber,et al. Data Security and Raw Data Access of Contemporary Mobile Sensor Devices , 2019 .
[22] Maolin Jin,et al. Adaptive Integral Sliding Mode Control With Time-Delay Estimation for Robot Manipulators , 2017, IEEE Transactions on Industrial Electronics.
[23] Zhiliang Wang,et al. Improved Deep Belief Networks (IDBN) Dynamic Model-Based Detection and Mitigation for Targeted Attacks on Heavy-Duty Robots , 2018 .
[24] Geok See Ng,et al. Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems , 2017, 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC).
[25] Xianbin Wang,et al. Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.
[26] Elena Basan,et al. Analysis of the Impact of Denial of Service Attacks on the Group of Robots , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[27] Marco Conti,et al. Data Management in Industry 4.0: State of the Art and Open Challenges , 2019, IEEE Access.
[28] Andrea Maria Zanchettin,et al. An Experimental Security Analysis of an Industrial Robot Controller , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[29] Ahmed Meddahi,et al. NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures , 2018, IEEE Communications Surveys & Tutorials.
[30] Nikhil Chopra,et al. On content modification attacks in bilateral teleoperation systems , 2016, 2016 American Control Conference (ACC).
[31] Thenkurussi Kesavadas,et al. Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[32] Xiong Luo,et al. Compliance Control Using Hydraulic Heavy-Duty Manipulator , 2019, IEEE Transactions on Industrial Informatics.
[33] Xiangpeng Xie,et al. Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
[34] J. R. Llata,et al. Working Together: A Review on Safe Human-Robot Collaboration in Industrial Environments , 2017, IEEE Access.
[35] Marcelo V. Garcia,et al. An Approach of Cyber-Physical Production Systems Architecture for Robot Control , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[36] Xinyu Yang,et al. Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.
[37] Felix Lorenz,et al. Online-Monitoring Autonomous Transport Robots with an R-valued Temporal Logic , 2018, 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE).
[38] Dong Zhao,et al. Kinematic calibration of a 6-DOF hybrid robot by considering multicollinearity in the identification Jacobian , 2019, Mechanism and Machine Theory.