메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3418-3425

Cyber-physical security via geometric control: Distributed monitoring and malicious attacks

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED SYSTEMS; GRAPH THEORY; NETWORK SECURITY;

EID: 84874233151     PISSN: 07431546     EISSN: 25762370     Source Type: Conference Proceeding    
DOI: 10.1109/CDC.2012.6426257     Document Type: Conference Paper
Times cited : (64)

References (33)
  • 2
    • 36249010910 scopus 로고    scopus 로고
    • Lessons learned from the Maroochy water breach
    • J. Slay and M. Miller, "Lessons learned from the Maroochy water breach," Critical Infrastructure Protection, vol. 253, pp. 73-82, 2007.
    • (2007) Critical Infrastructure Protection , vol.253 , pp. 73-82
    • Slay, J.1    Miller, M.2
  • 3
    • 77950343228 scopus 로고    scopus 로고
    • The day the samba stopped
    • 06 March - 26 March
    • J. P. Conti, "The day the samba stopped," Engineering Technology, vol. 5, no. 4, pp. 46-47, 06 March - 26 March, 2010.
    • (2010) Engineering Technology , vol.5 , Issue.4 , pp. 46-47
    • Conti, J.P.1
  • 5
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011.
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.P.1    Rohozinski, R.2
  • 6
    • 46749138780 scopus 로고    scopus 로고
    • Hackers vs slackers
    • G. Richards, "Hackers vs slackers," Engineering & Technology, vol. 3, no. 19, pp. 40-43, 2008.
    • (2008) Engineering & Technology , vol.3 , Issue.19 , pp. 40-43
    • Richards, G.1
  • 8
    • 67650109811 scopus 로고    scopus 로고
    • Safe and secure networked control systems under denial-of-service attacks
    • Apr.
    • S. Amin, A. Cárdenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in Hybrid Systems: Computation and Control, vol. 5469, Apr. 2009, pp. 31-45.
    • (2009) Hybrid Systems: Computation and Control , vol.5469 , pp. 31-45
    • Amin, S.1    Cárdenas, A.2    Sastry, S.3
  • 9
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Chicago, IL, USA, Nov.
    • Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in ACM Conference on Computer and Communications Security, Chicago, IL, USA, Nov. 2009, pp. 21-32.
    • (2009) ACM Conference on Computer and Communications Security , pp. 21-32
    • Liu, Y.1    Reiter, M.K.2    Ning, P.3
  • 12
    • 84866745498 scopus 로고    scopus 로고
    • A decoupled feedback structure for covertly appropriating network control systems
    • Milan, Italy, Aug.
    • R. Smith, "A decoupled feedback structure for covertly appropriating network control systems," in IFAC World Congress, Milan, Italy, Aug. 2011, pp. 90-95.
    • (2011) IFAC World Congress , pp. 90-95
    • Smith, R.1
  • 13
    • 0030369168 scopus 로고    scopus 로고
    • The potential for malicious control in a competitive power systems environment
    • Dearborn, MI, USA
    • C. L. DeMarco, J. V. Sariashkar, and F. Alvarado, "The potential for malicious control in a competitive power systems environment," in IEEE Int. Conf. on Control Applications, Dearborn, MI, USA, 1996, pp. 462-467.
    • (1996) IEEE Int. Conf. on Control Applications , pp. 462-467
    • Demarco, C.L.1    Sariashkar, J.V.2    Alvarado, F.3
  • 14
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • Gaithersburg, MD, USA, Oct.
    • G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in IEEE Int. Conf. on Smart Grid Communications, Gaithersburg, MD, USA, Oct. 2010, pp. 214-219.
    • (2010) IEEE Int. Conf. on Smart Grid Communications , pp. 214-219
    • Dan, G.1    Sandberg, H.2
  • 16
    • 82155185205 scopus 로고    scopus 로고
    • Distributed internet-based load altering attacks against smart power grids
    • A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed internet-based load altering attacks against smart power grids," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 667 -674, 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 667-674
    • Mohsenian-Rad, A.-H.1    Leon-Garcia, A.2
  • 17
    • 84874173102 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proceedings of the IEEE, vol. 99, no. 1, pp. 1-15, 2012.
    • (2012) Proceedings of the IEEE , vol.99 , Issue.1 , pp. 1-15
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 18
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Transactions on Automatic Control, vol. 56, no. 7, pp. 1495-1508, 2011.
    • (2011) IEEE Transactions on Automatic Control , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.2
  • 19
    • 84855392746 scopus 로고    scopus 로고
    • Consensus computation in unreliable networks: A system theoretic approach
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Transactions on Automatic Control, vol. 57, no. 1, pp. 90-104, 2012.
    • (2012) IEEE Transactions on Automatic Control , vol.57 , Issue.1 , pp. 90-104
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 24
    • 79955998041 scopus 로고    scopus 로고
    • False data injection attacks in control systems
    • Stockholm, Sweden, Apr.
    • Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in First Workshop on Secure Control Systems, Stockholm, Sweden, Apr. 2010.
    • (2010) First Workshop on Secure Control Systems
    • Mo, Y.1    Sinopoli, B.2
  • 25
    • 0026068441 scopus 로고
    • A graph-theoretic characterization for the rank of the transfer matrix of a structured system
    • J. W. van der Woude, "A graph-theoretic characterization for the rank of the transfer matrix of a structured system," Mathematics of Control, Signals and Systems, vol. 4, no. 1, pp. 33-40, 1991.
    • (1991) Mathematics of Control, Signals and Systems , vol.4 , Issue.1 , pp. 33-40
    • Woude Der Van, J.W.1
  • 26
    • 80053157963 scopus 로고    scopus 로고
    • A graph-theoretical characterization of power network vulnerabilities
    • San Francisco, CA, USA, Jun.
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in American Control Conference, San Francisco, CA, USA, Jun. 2011, pp. 3918-3923.
    • (2011) American Control Conference , pp. 3918-3923
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 27
    • 84856104549 scopus 로고    scopus 로고
    • Distributed detection of cyberphysical attacks in power networks: A waveform relaxation approach
    • Allerton, IL, USA, Sep.
    • F. Dörfler, F. Pasqualetti, and F. Bullo, "Distributed detection of cyberphysical attacks in power networks: A waveform relaxation approach," in Allerton Conf. on Communications, Control and Computing, Allerton, IL, USA, Sep. 2011, pp. 1486-1491.
    • (2011) Allerton Conf. on Communications, Control and Computing , pp. 1486-1491
    • Dörfler, F.1    Pasqualetti, F.2    Bullo, F.3
  • 28
    • 0040761805 scopus 로고
    • Invariant subspaces and invertibility properties for singular systems: The general case
    • T. Geerts, "Invariant subspaces and invertibility properties for singular systems: The general case," Linear Algebra and its Applications, vol. 183, pp. 61-88, 1993.
    • (1993) Linear Algebra and Its Applications , vol.183 , pp. 61-88
    • Geerts, T.1
  • 30
    • 79251598797 scopus 로고    scopus 로고
    • On convergence conditions of waveform relaxation methods for linear differential-algebraic equations
    • Z. Z. Bai and X. Yang, "On convergence conditions of waveform relaxation methods for linear differential-algebraic equations," Journal of Computational and Applied Mathematics, vol. 235, no. 8, pp. 2790-2804, 2011.
    • (2011) Journal of Computational and Applied Mathematics , vol.235 , Issue.8 , pp. 2790-2804
    • Bai, Z.Z.1    Yang, X.2
  • 32
    • 0025402885 scopus 로고
    • Geometric design techniques for observers in singular systems
    • F. L. Lewis, "Geometric design techniques for observers in singular systems," Automatica, vol. 26, no. 2, pp. 411-415, 1990.
    • (1990) Automatica , vol.26 , Issue.2 , pp. 411-415
    • Lewis, F.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.