-
1
-
-
84874252505
-
Attack detection and identification in cyber-physical systems
-
Aug., submitted
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Transactions on Automatic Control, Aug. 2012, submitted.
-
(2012)
IEEE Transactions on Automatic Control
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
2
-
-
36249010910
-
Lessons learned from the Maroochy water breach
-
J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," Critical Infrastructure Protection, vol. 253, pp. 73-82, 2007.
-
(2007)
Critical Infrastructure Protection
, vol.253
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
3
-
-
77950343228
-
The day the samba stopped
-
06 March - 26 March
-
J. P. Conti, "The day the samba stopped," Engineering Technology, vol. 5, no. 4, pp. 46-47, 06 March - 26 March, 2010.
-
(2010)
Engineering Technology
, vol.5
, Issue.4
, pp. 46-47
-
-
Conti, J.P.1
-
5
-
-
79251616434
-
Stuxnet and the future of cyber war
-
J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011.
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.P.1
Rohozinski, R.2
-
6
-
-
46749138780
-
Hackers vs slackers
-
G. Richards, "Hackers vs slackers," Engineering & Technology, vol. 3, no. 19, pp. 40-43, 2008.
-
(2008)
Engineering & Technology
, vol.3
, Issue.19
, pp. 40-43
-
-
Richards, G.1
-
8
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Apr.
-
S. Amin, A. Cárdenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in Hybrid Systems: Computation and Control, vol. 5469, Apr. 2009, pp. 31-45.
-
(2009)
Hybrid Systems: Computation and Control
, vol.5469
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.2
Sastry, S.3
-
9
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL, USA, Nov.
-
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in ACM Conference on Computer and Communications Security, Chicago, IL, USA, Nov. 2009, pp. 21-32.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
10
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
Atlanta, GA, USA, Dec.
-
A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. Sastry, "Cyber security analysis of state estimators in electric power systems," in IEEE Conf. on Decision and Control, Atlanta, GA, USA, Dec. 2010, pp. 5991-5998.
-
(2010)
IEEE Conf. on Decision and Control
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.H.4
Sastry, S.5
-
11
-
-
77949601382
-
Secure control against replay attacks
-
Monticello, IL, USA, Sep.
-
Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Allerton Conf. on Communications, Control and Computing, Monticello, IL, USA, Sep. 2010, pp. 911-918.
-
(2010)
Allerton Conf. on Communications, Control and Computing
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
12
-
-
84866745498
-
A decoupled feedback structure for covertly appropriating network control systems
-
Milan, Italy, Aug.
-
R. Smith, "A decoupled feedback structure for covertly appropriating network control systems," in IFAC World Congress, Milan, Italy, Aug. 2011, pp. 90-95.
-
(2011)
IFAC World Congress
, pp. 90-95
-
-
Smith, R.1
-
13
-
-
0030369168
-
The potential for malicious control in a competitive power systems environment
-
Dearborn, MI, USA
-
C. L. DeMarco, J. V. Sariashkar, and F. Alvarado, "The potential for malicious control in a competitive power systems environment," in IEEE Int. Conf. on Control Applications, Dearborn, MI, USA, 1996, pp. 462-467.
-
(1996)
IEEE Int. Conf. on Control Applications
, pp. 462-467
-
-
Demarco, C.L.1
Sariashkar, J.V.2
Alvarado, F.3
-
14
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
Gaithersburg, MD, USA, Oct.
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in IEEE Int. Conf. on Smart Grid Communications, Gaithersburg, MD, USA, Oct. 2010, pp. 214-219.
-
(2010)
IEEE Int. Conf. on Smart Grid Communications
, pp. 214-219
-
-
Dan, G.1
Sandberg, H.2
-
15
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Orlando, FL, USA, Dec.
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," in IEEE Conf. on Decision and Control and European Control Conference, Orlando, FL, USA, Dec. 2011, pp. 2195-2201.
-
(2011)
IEEE Conf. on Decision and Control and European Control Conference
, pp. 2195-2201
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
16
-
-
82155185205
-
Distributed internet-based load altering attacks against smart power grids
-
A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed internet-based load altering attacks against smart power grids," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 667 -674, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.-H.1
Leon-Garcia, A.2
-
17
-
-
84874173102
-
Cyber-physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proceedings of the IEEE, vol. 99, no. 1, pp. 1-15, 2012.
-
(2012)
Proceedings of the IEEE
, vol.99
, Issue.1
, pp. 1-15
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
18
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Transactions on Automatic Control, vol. 56, no. 7, pp. 1495-1508, 2011.
-
(2011)
IEEE Transactions on Automatic Control
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.2
-
19
-
-
84855392746
-
Consensus computation in unreliable networks: A system theoretic approach
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Transactions on Automatic Control, vol. 57, no. 1, pp. 90-104, 2012.
-
(2012)
IEEE Transactions on Automatic Control
, vol.57
, Issue.1
, pp. 90-104
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
20
-
-
77953044026
-
Stealthy deception attacks on water SCADA systems
-
Stockholm, Sweden, Apr.
-
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Stealthy deception attacks on water SCADA systems," in Hybrid Systems: Computation and Control, Stockholm, Sweden, Apr. 2010, pp. 161-170.
-
(2010)
Hybrid Systems: Computation and Control
, pp. 161-170
-
-
Amin, S.1
Litrico, X.2
Sastry, S.S.3
Bayen, A.M.4
-
21
-
-
78049296486
-
A fault diagnosis and security framework for water systems
-
D. G. Eliades and M. M. Polycarpou, "A fault diagnosis and security framework for water systems," IEEE Transactions on Control Systems Technology, vol. 18, no. 6, pp. 1254-1265, 2010.
-
(2010)
IEEE Transactions on Control Systems Technology
, vol.18
, Issue.6
, pp. 1254-1265
-
-
Eliades, D.G.1
Polycarpou, M.M.2
-
24
-
-
79955998041
-
False data injection attacks in control systems
-
Stockholm, Sweden, Apr.
-
Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in First Workshop on Secure Control Systems, Stockholm, Sweden, Apr. 2010.
-
(2010)
First Workshop on Secure Control Systems
-
-
Mo, Y.1
Sinopoli, B.2
-
25
-
-
0026068441
-
A graph-theoretic characterization for the rank of the transfer matrix of a structured system
-
J. W. van der Woude, "A graph-theoretic characterization for the rank of the transfer matrix of a structured system," Mathematics of Control, Signals and Systems, vol. 4, no. 1, pp. 33-40, 1991.
-
(1991)
Mathematics of Control, Signals and Systems
, vol.4
, Issue.1
, pp. 33-40
-
-
Woude Der Van, J.W.1
-
26
-
-
80053157963
-
A graph-theoretical characterization of power network vulnerabilities
-
San Francisco, CA, USA, Jun.
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in American Control Conference, San Francisco, CA, USA, Jun. 2011, pp. 3918-3923.
-
(2011)
American Control Conference
, pp. 3918-3923
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
27
-
-
84856104549
-
Distributed detection of cyberphysical attacks in power networks: A waveform relaxation approach
-
Allerton, IL, USA, Sep.
-
F. Dörfler, F. Pasqualetti, and F. Bullo, "Distributed detection of cyberphysical attacks in power networks: A waveform relaxation approach," in Allerton Conf. on Communications, Control and Computing, Allerton, IL, USA, Sep. 2011, pp. 1486-1491.
-
(2011)
Allerton Conf. on Communications, Control and Computing
, pp. 1486-1491
-
-
Dörfler, F.1
Pasqualetti, F.2
Bullo, F.3
-
28
-
-
0040761805
-
Invariant subspaces and invertibility properties for singular systems: The general case
-
T. Geerts, "Invariant subspaces and invertibility properties for singular systems: The general case," Linear Algebra and its Applications, vol. 183, pp. 61-88, 1993.
-
(1993)
Linear Algebra and Its Applications
, vol.183
, pp. 61-88
-
-
Geerts, T.1
-
29
-
-
0020781156
-
The waveform relaxation method for time-domain analysis of large scale integrated circuits
-
E. Lelarasmee, A. E. Ruehli, and A. L. Sangiovanni-Vincentelli, "The waveform relaxation method for time-domain analysis of large scale integrated circuits," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 1, no. 3, pp. 131-145, 1982.
-
(1982)
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
, vol.1
, Issue.3
, pp. 131-145
-
-
Lelarasmee, E.1
Ruehli, A.E.2
Sangiovanni-Vincentelli, A.L.3
-
30
-
-
79251598797
-
On convergence conditions of waveform relaxation methods for linear differential-algebraic equations
-
Z. Z. Bai and X. Yang, "On convergence conditions of waveform relaxation methods for linear differential-algebraic equations," Journal of Computational and Applied Mathematics, vol. 235, no. 8, pp. 2790-2804, 2011.
-
(2011)
Journal of Computational and Applied Mathematics
, vol.235
, Issue.8
, pp. 2790-2804
-
-
Bai, Z.Z.1
Yang, X.2
-
31
-
-
84874223367
-
Continuous-time distributed estimation with discrete communication
-
Aug., Submitted
-
F. Dörfler, F. Pasqualetti, and F. Bullo, "Continuous-time distributed estimation with discrete communication," Journal of Selected Topics in Signal Processing, Aug. 2012, Submitted.
-
(2012)
Journal of Selected Topics in Signal Processing
-
-
Dörfler, F.1
Pasqualetti, F.2
Bullo, F.3
-
32
-
-
0025402885
-
Geometric design techniques for observers in singular systems
-
F. L. Lewis, "Geometric design techniques for observers in singular systems," Automatica, vol. 26, no. 2, pp. 411-415, 1990.
-
(1990)
Automatica
, vol.26
, Issue.2
, pp. 411-415
-
-
Lewis, F.L.1
-
33
-
-
0026107664
-
An application of Prony methods in PSS design for multimachine systems
-
D. J. Trudnowski, J. R. Smith, T. A. Short, and D. A. Pierre, "An application of Prony methods in PSS design for multimachine systems," IEEE Transactions on Power Systems, vol. 6, no. 1, pp. 118-126, 1991.
-
(1991)
IEEE Transactions on Power Systems
, vol.6
, Issue.1
, pp. 118-126
-
-
Trudnowski, D.J.1
Smith, J.R.2
Short, T.A.3
Pierre, D.A.4
|