-
1
-
-
84856082215
-
Secure state-estimation for dynamical systems under active adversaries
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure state-estimation for dynamical systems under active adversaries," in 49th Annual Allerton Conference on Communication, Control, and Computing, 2011, 2011.
-
(2011)
49th Annual Allerton Conference on Communication, Control, and Computing, 2011
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
2
-
-
85084140752
-
Research challenges for the security of control systems
-
USENIX Association
-
A. Cárdenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems," in Proceedings of the 3rd conference on Hot topics in security. USENIX Association, 2008, p. 6.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 6
-
-
Cárdenas, A.1
Amin, S.2
Sastry, S.3
-
3
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
A. Teixeira, S. Amin, H. Sandberg, K. Johansson, and S. Sastry, "Cyber security analysis of state estimators in electric power systems," in 49th IEEE Conference on Decision and Control (CDC 2010).
-
49th IEEE Conference on Decision and Control (CDC 2010)
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.4
Sastry, S.5
-
4
-
-
78651420105
-
On malicious data attacks on power system state estimation
-
IEEE
-
O. Kosut, L. Jia, R. Thomas, and L. Tong, "On malicious data attacks on power system state estimation," in Universities Power Engineering Conference (UPEC), 2010 45th International. IEEE, 2010, pp. 1-6.
-
(2010)
Universities Power Engineering Conference (UPEC), 2010 45th International.
, pp. 1-6
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
5
-
-
84855822190
-
-
arXiv: 1103.2795
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," arXiv:1103.2795, 2011.
-
(2011)
Cyber-physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
7
-
-
79953144412
-
The wireless control network: Monitoring for malicious behavior
-
S. Sundaram, M. Pajic, C. Hadjicostis, R. Mangharam, and G. Pappas, "The wireless control network: monitoring for malicious behavior," in 49th IEEE Conference on Decision and Control (CDC 2010).
-
49th IEEE Conference on Decision and Control (CDC 2010)
-
-
Sundaram, S.1
Pajic, M.2
Hadjicostis, C.3
Mangharam, R.4
Pappas, G.5
-
8
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo, T.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proceedings of the IEEE, vol. 100, no. 1, pp. 195-209, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.-J.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
9
-
-
79953138181
-
The wireless control network: Synthesis and robustness
-
M. Pajic, S. Sundaram, J. Le Ny, G. Pappas, and R. Mangharam, "The wireless control network: Synthesis and robustness," in 49th IEEE Conference on Decision and Control (CDC 2010), pp. 7576-7581.
-
49th IEEE Conference on Decision and Control (CDC 2010)
, pp. 7576-7581
-
-
Pajic, M.1
Sundaram, S.2
Le Ny, J.3
Pappas, G.4
Mangharam, R.5
-
12
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
July, to appear
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," Automatic Control, IEEE Transactions on, July 2011, to appear.
-
(2011)
Automatic Control, IEEE Transactions on
-
-
Sundaram, S.1
Hadjicostis, C.2
|