-
1
-
-
77953581925
-
Networked control system: Overview and research trends
-
Jul.
-
R. Gupta and M.-Y. Chow, "Networked control system: Overview and research trends," IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2527-2535, Jul. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.7
, pp. 2527-2535
-
-
Gupta, R.1
Chow, M.-Y.2
-
2
-
-
79951579275
-
Wireless model-based predictive networked control system over cooperative wireless network
-
Feb.
-
A. Ulusoy, O. Gurbuz, and A. Onat, "Wireless model-based predictive networked control system over cooperative wireless network," IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 41-51, Feb. 2011.
-
(2011)
IEEE Trans. Ind. Informat
, vol.7
, Issue.1
, pp. 41-51
-
-
Ulusoy, A.1
Gurbuz, O.2
Onat, A.3
-
3
-
-
84871978516
-
-
Common cyber security vulnerabilities observed in control system assessments by the INL NSTB program U.S. Department of Energy Office of Electricity, Delivery, and Energy Reliability, Washington, DC 2008 Online. Available
-
"Common cyber security vulnerabilities observed in control system assessments by the INL NSTB program," U.S. Department of Energy Office of Electricity, Delivery, and Energy Reliability, Washington, DC , 2008 [Online]. Available: http://www.controlsystemsroadmap. net/pdfs/INL-Common-Vulnerabilties. pdf
-
-
-
-
4
-
-
62449110159
-
Static security optimization for real-time systems
-
Feb
-
M. Lin, L. Xu, L. T. Yang, X. Qin, N. Zheng, Z. Wu, and M. Qiu, "Static security optimization for real-time systems," IEEE Trans. Ind. Informat., vol. 5, no. 1, pp. 22-37, Feb. 2009.
-
(2009)
IEEE Trans. Ind. Informat
, vol.5
, Issue.1
, pp. 22-37
-
-
Lin, M.1
Xu, L.2
Yang, L.T.3
Qin, X.4
Zheng, N.5
Wu, Z.6
Qiu, M.7
-
5
-
-
77956599919
-
Security in building automation systems
-
Nov.
-
W.Granzer, F. Praus, andW. Kastner, "Security in building automation systems," IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, Nov. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.11
, pp. 3622-3630
-
-
Granzer, W.1
Praus, F.2
Kastner, W.3
-
6
-
-
57349146668
-
Draco: Efficient resourcemanagement for resource-constrained control tasks
-
Jan
-
P. Marti, C. Lin, S. A. Brandt, M. Velasco, and J. M. Fuertes, "Draco: Efficient resourcemanagement for resource-constrained control tasks," IEEE Trans. Comput., vol. 58, no. 1, pp. 90-105, Jan. 2009.
-
(2009)
IEEE Trans. Comput
, vol.58
, Issue.1
, pp. 90-105
-
-
Marti, P.1
Lin, C.2
Brandt, S.A.3
Velasco, M.4
Fuertes, J.M.5
-
7
-
-
59749105367
-
A competitive-cooperative coevolutionary paradigmfor dynamicmultiobjective optimization
-
Feb
-
C. K. Goh and K. C. Tan, "A competitive-cooperative coevolutionary paradigmfor dynamicmultiobjective optimization," IEEE Trans. Evol. Comput., vol. 13, no. 1, pp. 103-127, Feb 2009.
-
(2009)
IEEE Trans. Evol. Comput
, vol.13
, Issue.1
, pp. 103-127
-
-
Goh, C.K.1
Tan, K.C.2
-
8
-
-
0034153728
-
Cooperative coevolution: An architecture for evolving coadapted subcomponents
-
M. A. Potter and K. A. De Jong, "Cooperative coevolution: An architecture for evolving coadapted subcomponents," J. Evol. Comput., vol. 8, no. 1, pp. 1-29, 2000.
-
(2000)
J. Evol. Comput
, vol.8
, Issue.1
, pp. 1-29
-
-
Potter, M.A.1
De Jong, K.A.2
-
9
-
-
32144448677
-
Analyzing oligopolistic electricity market using coevolutionary computation
-
DOI 10.1109/TPWRS.2005.862005
-
H. Chen, K. P.Wong, D. H. M. Nguyen, and C. Y. Chung, "Analyzing oligopoly electricity market using coevolutionary computation," IEEE Trans. Power Syst., vol. 21, no. 1, pp. 143-152, Feb. 2006. (Pubitemid 43204713)
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.1
, pp. 143-152
-
-
Chen, H.1
Wong, K.P.2
Nguyen, D.H.M.3
Chung, C.Y.4
-
10
-
-
79951577827
-
Formal vulnerability analysis of a security system for remote fieldbus access
-
Feb.
-
M. Cheminod, A. Pironti, and R. Sisto, "Formal vulnerability analysis of a security system for remote fieldbus access," IEEE Trans. Ind. Informat., vol. 7, no. 1, pp. 30-40, Feb. 2011.
-
(2011)
IEEE Trans. Ind. Informat
, vol.7
, Issue.1
, pp. 30-40
-
-
Cheminod, M.1
Pironti, A.2
Sisto, R.3
-
11
-
-
79951649381
-
Network intrusion detection system embedded on a smart sensor
-
Mar.
-
F. Macia-Perez, F. Mora-Gimeno, D. Marcos-Jorquera, J. A. Gil-Martinez-Abarca, H. Ramos-Morillo, and I. Lorenzo-Fonseca, "Network intrusion detection system embedded on a smart sensor," IEEE Trans. Ind. Electron., vol. 58, no. 3, pp. 722-732, Mar. 2011.
-
(2011)
IEEE Trans. Ind. Electron
, vol.58
, Issue.3
, pp. 722-732
-
-
MacIa-Perez, F.1
Mora-Gimeno, F.2
Marcos-Jorquera, D.3
Gil-Martinez-Abarca, J.A.4
Ramos-Morillo, H.5
Lorenzo-Fonseca, I.6
-
12
-
-
21644440888
-
Security for industrial communication systems
-
DOI 10.1109/JPROC.2005.849714, Industrial Communication Systems
-
D. Dzung, M. Naedele, T. P. Von Hoff, and M. Crevatin, "Security for industrial communication systems," Proc. IEEE, vol. 93, no. 6, pp. 1152-1177, Jun. 2005. (Pubitemid 40928634)
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Von Hoff, T.P.3
Crevatin, M.4
-
13
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Jun. 17-20
-
A.A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in 28th Int. Conf. Distrib. Comput. Syst. Workshops, Jun. 17-20, 2008, pp. 495-500.
-
(2008)
28th Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
14
-
-
84929235708
-
Cyber-physical security of a smart grid infrastructure
-
Dec
-
D. T. H. J. Kim, Y. Mo, K. Bracik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proc. IEEE-Spec. Issue Cyber-Phys. Syst., no. 99, pp. 1-15, Dec. 2011.
-
(2011)
Proc IEEE-Spec. Issue Cyber-Phys. Syst
, Issue.99
, pp. 1-15
-
-
Kim, D.T.H.J.1
Mo, Y.2
Bracik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
15
-
-
50649118126
-
A modeling framework for evaluating effectiveness of smart-infrastructure crises management systems
-
May 12-13
-
T. Mukherjee and S. K. S. Gupta, "A modeling framework for evaluating effectiveness of smart-infrastructure crises management systems," in Proc. 2008 IEEE Conf. Technol. Homeland Sec., May 12-13, 2008, pp. 549-554.
-
(2008)
Proc 2008 IEEE Conf. Technol. Homeland Sec
, pp. 549-554
-
-
Mukherjee, T.1
Gupta, S.K.S.2
-
16
-
-
28444465910
-
Distributed device networks with security constraints
-
DOI 10.1109/TII.2005.843826
-
Y. Xu, R. Song, L.Korba, L.Wang,W. Shen, and S. Lang, "Distributed device networks with security constraints," IEEE Trans. Ind. Informat., vol. 1, no. 4, pp. 217-225, Nov. 2005. (Pubitemid 41729785)
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.4
, pp. 217-225
-
-
Xu, Y.1
Song, R.2
Korba, L.3
Wang, L.4
Shen, W.5
Lang, S.6
-
17
-
-
34548049800
-
Industrial cybersecurity for a power system and SCADA networks - Be secure
-
DOI 10.1109/MIA.2007.4283509
-
A. A. Creery and E. J. Byres, "Industrial cybersecurity for a power system and SCADA networks-Be secure," IEEE Ind. Appl.Mag., vol. 13, no. 4, pp. 49-55, Jul.-Aug. 2007. (Pubitemid 47278233)
-
(2007)
IEEE Industry Applications Magazine
, vol.13
, Issue.4
, pp. 49-55
-
-
Creery, A.A.1
Byres, E.J.2
-
18
-
-
84855392746
-
Consensus computation in unreliable networks: A system theoretic approach
-
2012
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Trans. Autom. Control, vol. 57, no. 1, pp. 90-104, 2012.
-
IEEE Trans. Autom. Control
, vol.57
, Issue.1
, pp. 90-104
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
19
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence ofmalicious agents
-
Jul.
-
S. Sundaram and C. N. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence ofmalicious agents," IEEE Trans. Autom. Control, vol. 56, no. 7, pp. 1495-1508, Jul. 2011.
-
(2011)
IEEE Trans. Autom. Control
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
20
-
-
77957775842
-
Networked control systems under cyber attacks with applications to power networks
-
Jun. 30-Jul 2
-
A. Teixeira, Sandberg, and K. H. Johansson, "Networked control systems under cyber attacks with applications to power networks," in Proc. Amer. Control Conf. (ACC), Jun. 30-Jul. 2 2010, pp. 3690-3696.
-
(2010)
Proc. Amer. Control Conf. (ACC)
, pp. 3690-3696
-
-
Teixeira Sandberg, A.1
Johansson, K.H.2
-
21
-
-
75449094444
-
A delay-tolerant potential-field-based network implementation of an integrated navigation system
-
Feb.
-
R. A. Gupta, A. A. Masoud, and M.-Y. Chow, "A delay-tolerant potential-field-based network implementation of an integrated navigation system," IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 769-783, Feb. 2010.
-
(2010)
IEEE Trans. Ind. Electron
, vol.57
, Issue.2
, pp. 769-783
-
-
Gupta, R.A.1
Masoud, A.A.2
Chow, M.-Y.3
-
22
-
-
80052855909
-
A tradeoff model for performance and security in secured Networked Control Systems
-
W. Zeng and M.-Y. Chow, "A tradeoff model for performance and security in secured Networked Control Systems," in Proc. 2011 IEEE Int. Symp. Ind. Electron. (ISIE), 2011, pp. 1997-2002.
-
(2011)
Proc 2011 IEEE Int. Symp. Ind. Electron. (ISIE)
, pp. 1997-2002
-
-
Zeng, W.1
Chow, M.-Y.2
-
23
-
-
84857409336
-
Optimal tradeoff between performance and security in networked control systems based on coevolutionary algorithms
-
Jul.
-
W. Zeng and M.-Y. Chow, "Optimal tradeoff between performance and security in networked control systems based on coevolutionary algorithms," IEEE Trans. Ind. Electron., vol. 59, no. 7, pp. 3016-3025, Jul. 2012.
-
(2012)
IEEE Trans. Ind. Electron
, vol.59
, Issue.7
, pp. 3016-3025
-
-
Zeng, W.1
Chow, M.-Y.2
-
24
-
-
0030381419
-
Path tracking control of mobile robots using a quadratic curve
-
K. Yoshizawa, H. Hashimoto, M. Wada, and S. Mori, "Path tracking control of mobile robots using a quadratic curve," in Proc. 1996 IEEE Intell. Veh. Symp., 1996, pp. 58-63.
-
(1996)
Proc. 1996 IEEE Intell. Veh. Symp
, pp. 58-63
-
-
Yoshizawa, K.1
Hashimoto, H.2
Wada, M.3
Mori, S.4
-
25
-
-
0004216472
-
-
Englewood Cliffs NJ: Prentice-Hall
-
C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World. Englewood Cliffs, NJ: Prentice-Hall, 1995, p. 504.
-
(1995)
Network Security: Private Communication in A Public World
, pp. 504
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
26
-
-
70449501104
-
An adaptive tradeoff model for service performance and security in service-based systems
-
Jul. 6-10
-
S. S. Yau, Y. Yin, and H. G. An, "An adaptive tradeoff model for service performance and security in service-based systems," in Proc. 2009 IEEE Int. Conf. Web Serv., Jul. 6-10, 2009, pp. 287-294.
-
(2009)
Proc 2009 IEEE Int. Conf. Web Serv
, pp. 287-294
-
-
Yau, S.S.1
Yin, Y.2
An, H.G.3
-
27
-
-
36248956628
-
Opportunistic encryption: A trade-off between security and throughput in wireless networks
-
DOI 10.1109/TDSC.2007.70214
-
M. A. Haleem, C. N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, "Opportunistic encryption: A tradeoff between security and throughput in wireless networks," IEEE Trans. Depend. Secure Comput., vol. 4, no. 4, pp. 313-324, Oct.-Dec. 2007. (Pubitemid 350125896)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 313-324
-
-
Haleem, M.A.1
Mathur, C.N.2
Chandramouli, R.3
Subbalakshmi, K.P.4
-
28
-
-
33749867996
-
A distributed cooperative coevolutionary algorithm for multiobjective optimization
-
DOI 10.1109/TEVC.2005.860762
-
K. C. Tan, Y. J. Yang, and C. K. Goh, "A distributed cooperative coevolutionary algorithm for multiobjective optimization," IEEE Trans. Evol. Comput., vol. 10, no. 5, pp. 527-549, Oct. 2006. (Pubitemid 44560741)
-
(2006)
IEEE Transactions on Evolutionary Computation
, vol.10
, Issue.5
, pp. 527-549
-
-
Tan, K.C.1
Yang, Y.J.2
Goh, C.K.3
-
29
-
-
84944618434
-
A noncooperative equilibrium for supergames
-
J. W. Friedman, "A noncooperative equilibrium for supergames," Rev. Econ. Studies, vol. 38, pp. 1-12, 1971.
-
(1971)
Rev. Econ. Studies
, vol.38
, pp. 1-12
-
-
Friedman, J.W.1
|