-
2
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo, T. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proceedings of the IEEE, vol. 100, no. 1, pp. 195-209, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
3
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
IEEE
-
A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on. IEEE, 2008, pp. 495-500.
-
(2008)
Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on
, pp. 495-500
-
-
Cardenas, A.1
Amin, S.2
Sastry, S.3
-
4
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, p. 13, 2011.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
6
-
-
77951729734
-
A survey of game theory as applied to network security
-
IEEE
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, "A survey of game theory as applied to network security," in System Sciences (HICSS), 2010 43rd Hawaii International Conference on. IEEE, 2010, pp. 1-10.
-
(2010)
System Sciences (HICSS), 2010 43rd Hawaii International Conference on
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
7
-
-
2442604387
-
A game theory based approach for security in wireless sensor networks
-
IEEE
-
A. Agah, S. Das, and K. Basu, "A game theory based approach for security in wireless sensor networks," in Performance, Computing, and Communications, 2004 IEEE International Conference on. IEEE, 2004, pp. 259-263.
-
(2004)
Performance, Computing, and Communications, 2004 IEEE International Conference on
, pp. 259-263
-
-
Agah, A.1
Das, S.2
Basu, K.3
-
8
-
-
62749204467
-
Sensor scheduling using smart sensors
-
IEEE
-
P. Hovareshti, V. Gupta, and J. Baras, "Sensor scheduling using smart sensors," in Decision and Control, 2007 46th IEEE Conference on. IEEE, 2007, pp. 494-499.
-
(2007)
Decision and Control, 2007 46th IEEE Conference on
, pp. 494-499
-
-
Hovareshti, P.1
Gupta, V.2
Baras, J.3
-
9
-
-
0019397561
-
Detectability and stabilizability of time-varying discrete-time linear systems
-
Jan.
-
B. D. O. Anderson and J. B. Moore, "Detectability and stabilizability of time-varying discrete-time linear systems," SIAM Journal on Control and Optimization, vol. 19, no. 1, pp. 20-32, Jan. 1981.
-
(1981)
SIAM Journal on Control and Optimization
, vol.19
, Issue.1
, pp. 20-32
-
-
Anderson, B.D.O.1
Moore, J.B.2
-
11
-
-
84902349715
-
Optimal dos attack policy against remote state estimation
-
submitted
-
H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal dos attack policy against remote state estimation," in 12th European Control Conference, Zurich, Switzerland, July 2013 (submitted).
-
12th European Control Conference, Zurich, Switzerland, July 2013
-
-
Zhang, H.1
Cheng, P.2
Shi, L.3
Chen, J.4
-
12
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol. 10, no. 1, pp. 82-89, 2006.
-
(2006)
Internet Computing, IEEE
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
13
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
S. Amin, A. Cardenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," Hybrid Systems: Computation and Control, pp. 31-45, 2009.
-
(2009)
Hybrid Systems: Computation and Control
, pp. 31-45
-
-
Amin, S.1
Cardenas, A.2
Sastry, S.3
-
14
-
-
84855700411
-
Launching denial-of-service jamming attacks in underwater sensor networks
-
ACM
-
M. Zuba, Z. Shi, Z. Peng, and J. Cui, "Launching denial-of-service jamming attacks in underwater sensor networks," in Proceedings of the Sixth ACM International Workshop on Underwater Networks. ACM, 2011, p. 12.
-
(2011)
Proceedings of the Sixth ACM International Workshop on Underwater Networks
, pp. 12
-
-
Zuba, M.1
Shi, Z.2
Peng, Z.3
Cui, J.4
-
15
-
-
77949422929
-
Kalman filtering over a packet-dropping network: A probabilistic perspective
-
march
-
L. Shi, M. Epstein, and R. Murray, "Kalman filtering over a packet-dropping network: A probabilistic perspective," Automatic Control, IEEE Transactions on, vol. 55, no. 3, pp. 594 -604, march 2010.
-
(2010)
Automatic Control, IEEE Transactions on
, vol.55
, Issue.3
, pp. 594-604
-
-
Shi, L.1
Epstein, M.2
Murray, R.3
-
16
-
-
0001730497
-
Non-cooperative games
-
J. Nash, "Non-cooperative games," Annals of Mathematics, vol. 54, no. 2, pp. 286-295, 1951.
-
(1951)
Annals of Mathematics
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.1
|