메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1806-1813

Revealing stealthy attacks in control systems

Author keywords

[No Author keywords available]

Indexed keywords

DETECTION METHODS; IN-CONTROL; LINEAR TIME INVARIANT SYSTEMS; NUMERICAL EXAMPLE; SUFFICIENT CONDITIONS; ZERO DYNAMICS;

EID: 84875701366     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Allerton.2012.6483441     Document Type: Conference Paper
Times cited : (276)

References (17)
  • 1
    • 84875729651 scopus 로고    scopus 로고
    • Cyber search engine shodan exposes industrial control systems to new risks
    • June
    • W. Shefte, S. Al-Jamea, and R. O'Harrow. (2012, June) Cyber search engine shodan exposes industrial control systems to new risks. http://www. washingtonpost.com/investigations/cyber-search-engine-exposes-vulnerabilities/ 2012/06/03/gJQAIK9KCV-story.html. The Washington Post.
    • (2012) The Washington Post
    • Shefte, W.1    Al-Jamea, S.2    O'harrow, R.3
  • 2
    • 84856820495 scopus 로고    scopus 로고
    • Sources: Staged cyber attack reveals vulnerability in power grid
    • J. Meserve, "Sources: Staged cyber attack reveals vulnerability in power grid," CNN, 2007, available at http://edition.cnn.com/2007/US/09/26/ power.at.risk/index.html.
    • (2007) CNN
    • Meserve, J.1
  • 3
    • 84860301216 scopus 로고    scopus 로고
    • Stuxnet introduces the first known rootkit for industrial control systems
    • August 6th
    • Symantec, "Stuxnet introduces the first known rootkit for industrial control systems," Symantec, August 6th 2010, available at: http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit- scada-devices.
    • (2010) Symantec
  • 8
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • july
    • S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," Automatic Control, IEEE Transactions on, vol. 56, no. 7, pp. 1495-1508, july 2011.
    • (2011) Automatic Control, IEEE Transactions on , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.2
  • 9
    • 84866745498 scopus 로고    scopus 로고
    • A decoupled feedback structure for covertly appropriating networked control systems
    • Milano, Italy, August-September
    • R. Smith, "A decoupled feedback structure for covertly appropriating networked control systems," in Proc. of the 18th IFAC World Congress, Milano, Italy, August-September 2011.
    • (2011) Proc. of the 18th IFAC World Congress
    • Smith, R.1
  • 17
    • 0033704177 scopus 로고    scopus 로고
    • The quadruple-tank process: A multivariable laboratory process with an adjustable zero
    • May
    • K. Johansson, "The quadruple-tank process: a multivariable laboratory process with an adjustable zero," IEEE Transactions on Control Systems Technology, vol. 8, no. 3, pp. 456-465, May 2000.
    • (2000) IEEE Transactions on Control Systems Technology , vol.8 , Issue.3 , pp. 456-465
    • Johansson, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.