메뉴 건너뛰기




Volumn , Issue , 2012, Pages 40-47

Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies

Author keywords

complex networked control systems; cyber awareness; cyber physical systems; cyber security; data fusion; hierarchical architecture; human systems; resilient control

Indexed keywords

CYBER AWARENESS; CYBER PHYSICAL SYSTEMS (CPSS); CYBER SECURITY; HIERARCHICAL ARCHITECTURES; HUMAN SYSTEM; RESILIENT CONTROL;

EID: 84868558380     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISRCS.2012.6309291     Document Type: Conference Paper
Times cited : (24)

References (23)
  • 3
    • 84860647066 scopus 로고    scopus 로고
    • A hierarchical security architecture for smart grid
    • Z. Han, E. Hossain and V. Poor (Eds.), Cambridge University Press
    • Q. Zhu and T. Başar, "A hierarchical security architecture for smart grid," In Z. Han, E. Hossain and V. Poor (Eds.), Smart Grid Communications and Networking, Cambridge University Press, 2012.
    • (2012) Smart Grid Communications and Networking
    • Zhu, Q.1    Başar, T.2
  • 7
    • 80053414377 scopus 로고    scopus 로고
    • A hierarchical security architecture for cyber-physical systems
    • C. Rieger and T. Başar, Boise, ID, Aug. 9-11
    • Q. Zhu, C. Rieger and T. Başar, "A hierarchical security architecture for cyber-physical systems," in Proc. of the 4th Intl. Symposium on Resilient Control Systems (ISRCS), Boise, ID, Aug. 9-11, 2011.
    • (2011) Proc. of the 4th Intl. Symposium on Resilient Control Systems (ISRCS)
    • Zhu, Q.1
  • 10
    • 84860639959 scopus 로고    scopus 로고
    • Indices of power in optimal IDS default configuration: Theory and examples
    • College Park, MD, USA. Nov. 14-15
    • Q. Zhu and T. Başar, "Indices of power in optimal IDS default configuration: theory and examples," in Proc. of 2nd Conference on Decision and Game Theory (GameSec 2011), College Park, MD, USA. Nov. 14-15, 2011.
    • (2011) Proc. of 2nd Conference on Decision and Game Theory (GameSec 2011)
    • Zhu, Q.1    Başar, T.2
  • 13
    • 79961020278 scopus 로고    scopus 로고
    • Feedback control of Internet applications involving the tracking of dynamic data
    • July
    • S. B. Shah, K. M. Moudgalya, K. Ramamritham,"Feedback control of Internet applications involving the tracking of dynamic data," IFAC 17th World Congress, pp. 12413-12418, July, 2008.
    • (2008) IFAC 17th World Congress , pp. 12413-12418
    • Shah, S.B.1    Moudgalya, K.M.2    Ramamritham, K.3
  • 14
    • 84887406765 scopus 로고    scopus 로고
    • Building secure, resilient architectures for cyber mission assurance
    • H. G. Goldman, "Building secure, resilient architectures for cyber mission assurance," MITRE, 2010.
    • (2010) MITRE
    • Goldman, H.G.1
  • 18
    • 80053395925 scopus 로고    scopus 로고
    • Anomaly detection for resilient control systems using fuzzy-neural data fusion engine
    • Boise, ID, August
    • O. Linda, M. Manic and T. McJunkin, "Anomaly detection for resilient control systems using fuzzy-neural data fusion engine", ISRCS 2011, Boise, ID, August, 2011.
    • (2011) ISRCS 2011
    • Linda, O.1    Manic, M.2    McJunkin, T.3
  • 19
    • 84856738347 scopus 로고    scopus 로고
    • Concept of operations for data fusion visualization
    • Sept
    • R. Boring et al, "Concept of operations for data fusion visualization," ESREL 2011, Sept 2011.
    • (2011) ESREL 2011
    • Boring Et Al, R.1
  • 20
    • 23944486457 scopus 로고    scopus 로고
    • A survey of consensus problems in multi-agent coordination
    • June
    • W. Ren, R. W. Beard, and E. M. Atkins, "A survey of consensus problems in multi-agent coordination," 2005 American Control Conference, pp. 1859-1864, June, 2005.
    • (2005) 2005 American Control Conference , pp. 1859-1864
    • Ren, W.1    Beard, R.W.2    Atkins, E.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.