-
1
-
-
84875729651
-
Cyber search engine shodan exposes industrial control systems to new risks
-
June
-
W. Shefte, S. Al-Jamea, and R. O'Harrow. (2012, June) Cyber search engine shodan exposes industrial control systems to new risks. http://www. washingtonpost.com/investigations/cyber-search-engine-exposes-vulnerabilities/ 2012/06/03/gJQAIK9KCV-story.html. The Washington Post.
-
(2012)
The Washington Post
-
-
Shefte, W.1
Al-Jamea, S.2
O'harrow, R.3
-
2
-
-
84856820495
-
Sources: Staged cyber attack reveals vulnerability in power grid
-
J. Meserve, "Sources: Staged cyber attack reveals vulnerability in power grid," CNN, 2007, available at http://edition.cnn.com/2007/US/09/26/ power.at.risk/index.html.
-
(2007)
CNN
-
-
Meserve, J.1
-
3
-
-
84860301216
-
Stuxnet introduces the first known rootkit for industrial control systems
-
August 6th
-
Symantec, "Stuxnet introduces the first known rootkit for industrial control systems," Symantec, August 6th 2010, available at: http://www.symantec.com/connect/blogs/stuxnet-introduces-first-known-rootkit- scada-devices.
-
(2010)
Symantec
-
-
-
6
-
-
77957783940
-
Cyber attack in a two-area power system: Impact identification using reachability
-
jul
-
P. Esfahani, M. Vrakopoulou, K. Margellos, J. Lygeros, and G. Andersson, "Cyber attack in a two-area power system: Impact identification using reachability," in American Control Conference, 2010, jul 2010, pp. 962-967.
-
(2010)
American Control Conference, 2010
, pp. 962-967
-
-
Esfahani, P.1
Vrakopoulou, M.2
Margellos, K.3
Lygeros, J.4
Andersson, G.5
-
7
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
New York, NY, USA: ACM
-
A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry, "Attacks against process control systems: risk assessment, detection, and response," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '11. New York, NY, USA: ACM, 2011, pp. 355-366.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Ser. ASIACCS '11
, pp. 355-366
-
-
Cárdenas, A.1
Amin, S.2
Lin, Z.3
Huang, Y.4
Huang, C.5
Sastry, S.6
-
8
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
july
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," Automatic Control, IEEE Transactions on, vol. 56, no. 7, pp. 1495-1508, july 2011.
-
(2011)
Automatic Control, IEEE Transactions on
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.2
-
9
-
-
84866745498
-
A decoupled feedback structure for covertly appropriating networked control systems
-
Milano, Italy, August-September
-
R. Smith, "A decoupled feedback structure for covertly appropriating networked control systems," in Proc. of the 18th IFAC World Congress, Milano, Italy, August-September 2011.
-
(2011)
Proc. of the 18th IFAC World Congress
-
-
Smith, R.1
-
10
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Orlando, FL, USA, Dec.
-
F. Pasqualetti, F. Dorfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," in Proc. of the 50th IEEE Conf. on Decision and Control and European Control Conference, Orlando, FL, USA, Dec. 2011.
-
(2011)
Proc. of the 50th IEEE Conf. on Decision and Control and European Control Conference
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
11
-
-
84860632284
-
Attack models and scenarios for networked control systems
-
ACM
-
A. Teixeira, D. Pérez, H. Sandberg, and K. Johansson, "Attack models and scenarios for networked control systems," in Proceedings of the 1st international conference on High Confidence Networked Systems. ACM, 2012, pp. 55-64.
-
(2012)
Proceedings of the 1st International Conference on High Confidence Networked Systems
, pp. 55-64
-
-
Teixeira, A.1
Pérez, D.2
Sandberg, H.3
Johansson, K.4
-
13
-
-
0003585352
-
-
Upper Saddle River, NJ, USA: Prentice-Hall, Inc.
-
K. Zhou, J. C. Doyle, and K. Glover, Robust and Optimal Control. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1996.
-
(1996)
Robust and Optimal Control
-
-
Zhou, K.1
Doyle, J.C.2
Glover, K.3
-
17
-
-
0033704177
-
The quadruple-tank process: A multivariable laboratory process with an adjustable zero
-
May
-
K. Johansson, "The quadruple-tank process: a multivariable laboratory process with an adjustable zero," IEEE Transactions on Control Systems Technology, vol. 8, no. 3, pp. 456-465, May 2000.
-
(2000)
IEEE Transactions on Control Systems Technology
, vol.8
, Issue.3
, pp. 456-465
-
-
Johansson, K.1
|