-
1
-
-
80055028776
-
Challenges for securing cyber physical systems
-
DHS, July [Online]. Available
-
A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. S. Sastry, "Challenges for securing cyber physical systems," in Workshop on Future Directions in Cyber-physical Systems Security. DHS, July 2009. [Online]. Available: http://chess.eecs.berkeley.edu/pubs/601.html
-
(2009)
Workshop on Future Directions in Cyber-physical Systems Security
-
-
Cardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.S.6
-
7
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. Sastry, "Foundations of control and estimation over lossy networks," Proceedings of the IEEE, vol. 95, no. 1, pp. 163-187, 2007.
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.5
-
8
-
-
84856092295
-
Optimal control in the presence of an intelligent jammer with limited actions
-
A. Gupta, C. Langbort, and T. Basar, "Optimal control in the presence of an intelligent jammer with limited actions," in IEEE CDC 2010.
-
IEEE CDC 2010
-
-
Gupta, A.1
Langbort, C.2
Basar, T.3
-
9
-
-
84855822190
-
-
arXiv:1103.2795
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," arXiv:1103.2795, 2011.
-
(2011)
Cyber-physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
10
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
July to appear
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Trans. Autom. Control, July 2011, to appear.
-
(2011)
IEEE Trans. Autom. Control
-
-
Sundaram, S.1
Hadjicostis, C.2
-
11
-
-
79953144412
-
The wireless control network: Monitoring for malicious behavior
-
S. Sundaram, M. Pajic, C. Hadjicostis, R. Mangharam, and G. Pappas, "The wireless control network: monitoring for malicious behavior," in IEEE CDC 2010.
-
IEEE CDC 2010
-
-
Sundaram, S.1
Pajic, M.2
Hadjicostis, C.3
Mangharam, R.4
Pappas, G.5
-
12
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
A. Teixeira, S. Amin, H. Sandberg, K. Johansson, and S. Sastry, "Cyber security analysis of state estimators in electric power systems," in IEEE CDC 2010.
-
IEEE CDC 2010
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.4
Sastry, S.5
-
14
-
-
29144439194
-
Decoding by linear programming
-
E. Candes and T. Tao, "Decoding by linear programming," IEEE Trans. Inf. Theory, vol. 51, no. 12, pp. 4203-4215, 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.12
, pp. 4203-4215
-
-
Candes, E.1
Tao, T.2
-
16
-
-
0038516887
-
Generic properties and control of linear structured systems: A survey
-
J. Dion, C. Commault, and J. van der Woude, "Generic properties and control of linear structured systems: a survey," Automatica, 2003.
-
(2003)
Automatica
-
-
Dion, J.1
Commault, C.2
Van Der Woude, J.3
-
17
-
-
77956009889
-
Multiarray signal processing: Tensor decomposition meets compressed sensing
-
L. Lim and P. Comon, "Multiarray signal processing: Tensor decomposition meets compressed sensing," Comptes Rendus Mecanique, 2010.
-
(2010)
Comptes Rendus Mecanique
-
-
Lim, L.1
Comon, P.2
-
18
-
-
84856095209
-
Block-sparsity: Coherence and efficient recovery
-
Y. Eldar and H. Bolcskei, "Block-sparsity: Coherence and efficient recovery," in IEEE ICASSP 2009.
-
IEEE ICASSP 2009
-
-
Eldar, Y.1
Bolcskei, H.2
-
19
-
-
84938488621
-
Introduction to compressed sensing
-
Cambridge University Press
-
M. Davenport, M. Duarte, Y. Eldar, and G. Kutyniok, "Introduction to compressed sensing," in Compressed Sensing: Theory and Applications. Cambridge University Press, 2011, pp. 1-68.
-
(2011)
Compressed Sensing: Theory and Applications
, pp. 1-68
-
-
Davenport, M.1
Duarte, M.2
Eldar, Y.3
Kutyniok, G.4
-
22
-
-
84856095208
-
A graph-theoretical characterization of power network vulnerabilities
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in IEEE ACC 2011.
-
IEEE ACC 2011
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
|