-
1
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Beijing, China, June
-
A. A. Cárdenas, S. Amin, and S. S. Sastry, "Secure control: Towards survivable cyber-physical systems," in First International Workshop on Cyber-Physical Systems (WCPS2008), Beijing, China, June 2008, pp. 495-500. [Online]. Available: http://www.truststc.org/pubs/345.html
-
(2008)
First International Workshop on Cyber-Physical Systems (WCPS2008)
, pp. 495-500
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.S.3
-
2
-
-
77953689545
-
-
Ph.D. dissertation, EECS Department, University of California, Berkeley, May
-
T. G. Roosta, "Attacks and defenses of ubiquitous sensor networks," Ph.D. dissertation, EECS Department, University of California, Berkeley, May 2008. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/ TechRpts/2008/EECS-2008-58.html
-
(2008)
Attacks and Defenses of Ubiquitous Sensor Networks
-
-
Roosta, T.G.1
-
3
-
-
0004215089
-
-
1st ed. Morgan Kaufmann
-
N. Lynch, Distributed Algorithms, 1st ed. Morgan Kaufmann, 1997. [Online]. Available: http://www.amazon.com/exec/obidos/redirect?tag=citeulike07- 20&path=ASIN/1558603484
-
(1997)
Distributed Algorithms
-
-
Lynch, N.1
-
4
-
-
62749156165
-
Lazy consensus for networks with unknown but bounded disturbances
-
New Orleans, LA, December
-
D. Bauso, L. Giarre, and R. Pesenti, "Lazy consensus for networks with unknown but bounded disturbances," in Proceedings of the IEEE Conf. on Decision and Control, New Orleans, LA, December 2007, pp. 2283-2288.
-
(2007)
Proceedings of the IEEE Conf. on Decision and Control
, pp. 2283-2288
-
-
Bauso, D.1
Giarre, L.2
Pesenti, R.3
-
5
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Springer Berlin / Heidelberg, April
-
S. Amin, A. Cárdenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks." in Hybrid Systems: Computation and Control. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, April 2009, pp. 31-45.
-
(2009)
Hybrid Systems: Computation and Control. Lecture Notes in Computer Science
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.2
Sastry, S.3
-
6
-
-
52449119147
-
Distributed function calculation via linear iterations in the presence of malicious agents-part II: Overcoming malicious behavior
-
Seatle, WA, June
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterations in the presence of malicious agents-part II: Overcoming malicious behavior," in Proceedings of the American Control Conference, Seatle, WA, June 2008, pp. 1356-1361.
-
(2008)
Proceedings of the American Control Conference
, pp. 1356-1361
-
-
Sundaram, S.1
Hadjicostis, C.2
-
7
-
-
62749205479
-
Distributed intrusion detection for secure consensus computations
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Distributed intrusion detection for secure consensus computations," in Proceedings of Control and Decision Conference, 2007, pp. 5594-5599.
-
(2007)
Proceedings of Control and Decision Conference
, pp. 5594-5599
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
10
-
-
19044365246
-
Model-based fault detection and diagnosis: Status and applications
-
St. Petersburg, Russia, June
-
R. Isermann, "Model-based fault detection and diagnosis: status and applications," in Proceedings of the 16th IFAC Symposium on Automatic Control in Aerospace, St. Petersburg, Russia, June 2004, pp. 71-85.
-
(2004)
Proceedings of the 16th IFAC Symposium on Automatic Control in Aerospace
, pp. 71-85
-
-
Isermann, R.1
-
13
-
-
32144439983
-
Observer-based fault detection and identification scheme for power systems
-
Jan.
-
M. Aldeen and F. Crusca, "Observer-based fault detection and identification scheme for power systems," in IEE Proceedings-Generation, Transmission and Distribution, vol. 153, no. 1, Jan. 2006, pp. 71-79.
-
(2006)
IEE Proceedings-Generation, Transmission and Distribution
, vol.153
, Issue.1
, pp. 71-79
-
-
Aldeen, M.1
Crusca, F.2
-
14
-
-
80051925336
-
Consensus computation in unreliable networks: A system theoretic approach
-
submitted
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Transactions on Automatic Control, 2010, submitted, available online at http://www.fabiopas.it/ papers/FP-AB-FB-10a.pdf.
-
(2010)
IEEE Transactions on Automatic Control
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
15
-
-
81155148180
-
Distributed fault detection for interconnected second-order systems
-
to appear
-
I. Shames, A. M. H. Teixeira, H. Sandberg, and K. H. Johansson, "Distributed Fault Detection for Interconnected Second-Order Systems ," Automatica, 2011, to appear.
-
(2011)
Automatica
-
-
Shames, I.1
Teixeira, A.M.H.2
Sandberg, H.3
Johansson, K.H.4
-
16
-
-
84866745498
-
A decoupled feedback structure for covertly appropriating networked control systems
-
Milano, Italy, August-September
-
R. Smith, "A decoupled feedback structure for covertly appropriating networked control systems," in Proceedings of the 18th IFAC World Congress, Milano, Italy, August-September 2011.
-
(2011)
Proceedings of the 18th IFAC World Congress
-
-
Smith, R.1
-
18
-
-
77649317126
-
MATPOWER's extensible optimal power flow architecture
-
IEEE, July
-
R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas, "MATPOWER's extensible optimal power flow architecture," in Power and Energy Society General Meeting. IEEE, July 2009, pp. 1-7.
-
(2009)
Power and Energy Society General Meeting
, pp. 1-7
-
-
Zimmerman, R.D.1
Murillo-Sánchez, C.E.2
Thomas, R.J.3
|