-
1
-
-
80055028776
-
Challenges for securing cyber physical systems
-
Jul., DHS. [Online]
-
A. Cardenas et al., "Challenges for securing cyber physical systems," in Workshop Future Directions Cyber-Phys. Syst. Security, Jul. 2009, DHS. [Online]. Available: http://chess.eecs.berkeley.edu/pubs/601.html
-
(2009)
Workshop Future Directions Cyber-Phys. Syst. Security
-
-
Cardenas, A.1
-
3
-
-
85084140752
-
Research challenges for the security of control systems
-
A. Cárdenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems," in Proc. 3rd Conf. Hot Topics Security, 2008, p. 6.
-
(2008)
Proc. 3rd Conf. Hot Topics Security
, pp. 6
-
-
Cárdenas, A.1
Amin, S.2
Sastry, S.3
-
5
-
-
79251619734
-
Siemens: Stuxnet worm hit industrial systems
-
[Online]
-
R. McMillan, "Siemens: Stuxnet worm hit industrial systems," Computer World, 2010. [Online]. Available: http://www.computerworld.com/s/ article/9185419/Siemens-Stuxnet-worm-hit-industrial-systems? taxonomyId=142&pageNumber=1
-
(2010)
Computer World
-
-
McMillan, R.1
-
6
-
-
0024626996
-
Failure detection and identification
-
M. Massoumnia, G. Verghese, and A. Willsky, "Failure detection and identification," IEEE Trans. Autom. Control, vol. 34, no. 3, pp. 316-321, 1989.
-
(1989)
IEEE Trans. Autom. Control
, vol.34
, Issue.3
, pp. 316-321
-
-
Massoumnia, M.1
Verghese, G.2
Willsky, A.3
-
7
-
-
84891430842
-
-
New York, NY, USA: Springer-Verlag
-
M. Blanke, M. Kinnaert, J. Lunze, and M. Staroswiecki, Diagnosis and Fault-Tolerant Control. New York, NY, USA: Springer-Verlag, 2006.
-
(2006)
Diagnosis and Fault-Tolerant Control
-
-
Blanke, M.1
Kinnaert, M.2
Lunze, J.3
Staroswiecki, M.4
-
8
-
-
84874242657
-
-
Englewood Cliffs, NJ, USA: Prentice-Hall
-
K. Zhou and J. Doyle, Essentials of Robust Control, vol. 104. Englewood Cliffs, NJ, USA: Prentice-Hall, 1998.
-
(1998)
Essentials of Robust Control
, vol.104
-
-
Zhou, K.1
Doyle, J.2
-
9
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. Sastry, "Foundations of control and estimation over lossy networks," Proc. IEEE, vol. 95, no. 1, pp. 163-187, 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.5
-
10
-
-
79953130034
-
Optimal control in the presence of an intelligent jammer with limited actions
-
A. Gupta, C. Langbort, and T. Basar, "Optimal control in the presence of an intelligent jammer with limited actions," in Proc. 49th IEEE CDC'10, 2010, pp. 1096-1101.
-
(2010)
Proc. 49th IEEE CDC'10
, pp. 1096-1101
-
-
Gupta, A.1
Langbort, C.2
Basar, T.3
-
13
-
-
79953144412
-
The wireless control network: Monitoring for malicious behavior
-
S. Sundaram, M. Pajic, C. Hadjicostis, R. Mangharam, and G. Pappas, "The wireless control network: Monitoring for malicious behavior," in Proc. 49th IEEE Conf. Decision Control (CDC'10), 2010, pp. 5979-5984.
-
(2010)
Proc. 49th IEEE Conf. Decision Control (CDC'10)
, pp. 5979-5984
-
-
Sundaram, S.1
Pajic, M.2
Hadjicostis, C.3
Mangharam, R.4
Pappas, G.5
-
14
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence ofmalicious agents
-
Jul
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence ofmalicious agents," IEEE Trans. Autom. Control, vol. 56, no. 7, pp. 1495-1508, Jul. 2011.
-
(2011)
IEEE Trans. Autom. Control
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.2
-
15
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
A. Teixeira, S. Amin, H. Sandberg, K. Johansson, and S. Sastry, "Cyber security analysis of state estimators in electric power systems," in Proc. 49th IEEE CDC'10, 2010, pp. 5991-5998.
-
(2010)
Proc. 49th IEEE CDC'10
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.4
Sastry, S.5
-
16
-
-
29144439194
-
Decoding by linear programming
-
DOI 10.1109/TIT.2005.858979
-
E. Candes and T. Tao, "Decoding by linear programming," IEEE Trans. Inform. Theory, vol. 51, no. 12, pp. 4203-4215, 2005. (Pubitemid 41800353)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.12
, pp. 4203-4215
-
-
Candes, E.J.1
Tao, T.2
-
17
-
-
84855822190
-
-
arXiv: 1103.2795
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," arXiv:1103.2795, 2011.
-
(2011)
Cyber-physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
18
-
-
84856082215
-
Secure state-estimation for dynamical systems under active adversaries
-
[Online]
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure state-estimation for dynamical systems under active adversaries," in Proc. 49th Annu. Allerton Conf. Commun., Control, Comp., 2011, pp. 337-344. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=6120187
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comp
, pp. 337-344
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
19
-
-
84874254191
-
Security for control systems under sensor and actuator attacks
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Security for control systems under sensor and actuator attacks," in Proc. IEEE 51st Annu. Conf. Decision Control (CDC), 2012, pp. 3412-3417.
-
(2012)
Proc. IEEE 51st Annu. Conf. Decision Control (CDC)
, pp. 3412-3417
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
21
-
-
84875217216
-
Extended controllability and observability for linear systems
-
B. Molinari, "Extended controllability and observability for linear systems," IEEE Trans. Autom. Control, vol. 21, no. 1, pp. 136-137, 1976.
-
(1976)
IEEE Trans. Autom. Control
, vol.21
, Issue.1
, pp. 136-137
-
-
Molinari, B.1
-
22
-
-
51849090137
-
Euclidean sections of -n1 with sublinear randomness and error-correction over the reals
-
[Online]
-
V. Guruswami, J. Lee, and A. Wigderson, "Euclidean sections of -n1 with sublinear randomness and error-correction over the reals," in Proc. RANDOM' 08, 2008, pp. 444-454. [Online]. Available: http://link.springer. com/chapter/10.1007/978-3-540-85363-3-35
-
(2008)
Proc. RANDOM'08
, pp. 444-454
-
-
Guruswami, V.1
Lee, J.2
Wigderson, A.3
-
23
-
-
0038516887
-
Generic properties and control of linear structured systems: A survey
-
Jul
-
J. Dion, C. Commault, and J. van der Woude, "Generic properties and control of linear structured systems: A survey," Automatica, vol. 39, no. 7, pp. 1125-1144, Jul. 2003
-
(2003)
Automatica
, vol.39
, Issue.7
, pp. 1125-1144
-
-
Dion, J.1
Commault, C.2
Woude Der J.Van3
-
26
-
-
84871944240
-
False data injection attacks in control systems
-
[Online]
-
Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in Proc. First Workshop Secure Control Syst., 2010. [Online]. Available: https://www.truststc.org/conferences/10/CPSWeek/papers/scs1-paper-7. pdf
-
(2010)
Proc. First Workshop Secure Control Syst
-
-
Mo, Y.1
Sinopoli, B.2
-
27
-
-
70349223800
-
Block-sparsity: Coherence and efficient recovery
-
Y. Eldar and H. Bolcskei, "Block-sparsity: Coherence and efficient recovery," in Proc. IEEE ICASSP'09, 2009, pp. 2885-2888.
-
(2009)
Proc. IEEE ICASSP'09
, pp. 2885-2888
-
-
Eldar, Y.1
Bolcskei, H.2
-
28
-
-
84938488621
-
Introduction to compressed sensing
-
Cambridge, U.K.: Cambridge Univ. Press
-
M. Davenport, M. Duarte, Y. Eldar, and G. Kutyniok, "Introduction to compressed sensing," in Compressed Sensing: Theory and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2011, pp. 1-68.
-
(2011)
Compressed Sensing: Theory and Applications
-
-
Davenport, M.1
Duarte, M.2
Eldar, Y.3
Kutyniok, G.4
-
31
-
-
80053157963
-
A graph-theoretical characterization of power network vulnerabilities
-
San Francisco, CA
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in Proc. Amer. Control Conf., San Francisco, CA, 2011, pp. 3918-3923.
-
(2011)
Proc. Amer. Control Conf
, pp. 3918-3923
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
|