메뉴 건너뛰기




Volumn 59, Issue 6, 2014, Pages 1454-1467

Secure estimation and control for cyber-physical systems under adversarial attacks

Author keywords

Algorithm; feedback controller

Indexed keywords

ALGORITHMS; CLOSED LOOP CONTROL SYSTEMS; DESIGN; EMBEDDED SYSTEMS; LINEAR SYSTEMS; NONLINEAR CONTROL SYSTEMS; SENSORS;

EID: 84901474949     PISSN: 00189286     EISSN: None     Source Type: Journal    
DOI: 10.1109/TAC.2014.2303233     Document Type: Article
Times cited : (1185)

References (31)
  • 1
    • 80055028776 scopus 로고    scopus 로고
    • Challenges for securing cyber physical systems
    • Jul., DHS. [Online]
    • A. Cardenas et al., "Challenges for securing cyber physical systems," in Workshop Future Directions Cyber-Phys. Syst. Security, Jul. 2009, DHS. [Online]. Available: http://chess.eecs.berkeley.edu/pubs/601.html
    • (2009) Workshop Future Directions Cyber-Phys. Syst. Security
    • Cardenas, A.1
  • 5
    • 79251619734 scopus 로고    scopus 로고
    • Siemens: Stuxnet worm hit industrial systems
    • [Online]
    • R. McMillan, "Siemens: Stuxnet worm hit industrial systems," Computer World, 2010. [Online]. Available: http://www.computerworld.com/s/ article/9185419/Siemens-Stuxnet-worm-hit-industrial-systems? taxonomyId=142&pageNumber=1
    • (2010) Computer World
    • McMillan, R.1
  • 9
    • 64149120662 scopus 로고    scopus 로고
    • Foundations of control and estimation over lossy networks
    • L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. Sastry, "Foundations of control and estimation over lossy networks," Proc. IEEE, vol. 95, no. 1, pp. 163-187, 2007.
    • (2007) Proc. IEEE , vol.95 , Issue.1 , pp. 163-187
    • Schenato, L.1    Sinopoli, B.2    Franceschetti, M.3    Poolla, K.4    Sastry, S.5
  • 10
    • 79953130034 scopus 로고    scopus 로고
    • Optimal control in the presence of an intelligent jammer with limited actions
    • A. Gupta, C. Langbort, and T. Basar, "Optimal control in the presence of an intelligent jammer with limited actions," in Proc. 49th IEEE CDC'10, 2010, pp. 1096-1101.
    • (2010) Proc. 49th IEEE CDC'10 , pp. 1096-1101
    • Gupta, A.1    Langbort, C.2    Basar, T.3
  • 14
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence ofmalicious agents
    • Jul
    • S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence ofmalicious agents," IEEE Trans. Autom. Control, vol. 56, no. 7, pp. 1495-1508, Jul. 2011.
    • (2011) IEEE Trans. Autom. Control , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.2
  • 16
    • 29144439194 scopus 로고    scopus 로고
    • Decoding by linear programming
    • DOI 10.1109/TIT.2005.858979
    • E. Candes and T. Tao, "Decoding by linear programming," IEEE Trans. Inform. Theory, vol. 51, no. 12, pp. 4203-4215, 2005. (Pubitemid 41800353)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.12 , pp. 4203-4215
    • Candes, E.J.1    Tao, T.2
  • 18
    • 84856082215 scopus 로고    scopus 로고
    • Secure state-estimation for dynamical systems under active adversaries
    • [Online]
    • H. Fawzi, P. Tabuada, and S. Diggavi, "Secure state-estimation for dynamical systems under active adversaries," in Proc. 49th Annu. Allerton Conf. Commun., Control, Comp., 2011, pp. 337-344. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=6120187
    • (2011) Proc. 49th Annu. Allerton Conf. Commun., Control, Comp , pp. 337-344
    • Fawzi, H.1    Tabuada, P.2    Diggavi, S.3
  • 21
    • 84875217216 scopus 로고
    • Extended controllability and observability for linear systems
    • B. Molinari, "Extended controllability and observability for linear systems," IEEE Trans. Autom. Control, vol. 21, no. 1, pp. 136-137, 1976.
    • (1976) IEEE Trans. Autom. Control , vol.21 , Issue.1 , pp. 136-137
    • Molinari, B.1
  • 22
    • 51849090137 scopus 로고    scopus 로고
    • Euclidean sections of -n1 with sublinear randomness and error-correction over the reals
    • [Online]
    • V. Guruswami, J. Lee, and A. Wigderson, "Euclidean sections of -n1 with sublinear randomness and error-correction over the reals," in Proc. RANDOM' 08, 2008, pp. 444-454. [Online]. Available: http://link.springer. com/chapter/10.1007/978-3-540-85363-3-35
    • (2008) Proc. RANDOM'08 , pp. 444-454
    • Guruswami, V.1    Lee, J.2    Wigderson, A.3
  • 23
    • 0038516887 scopus 로고    scopus 로고
    • Generic properties and control of linear structured systems: A survey
    • Jul
    • J. Dion, C. Commault, and J. van der Woude, "Generic properties and control of linear structured systems: A survey," Automatica, vol. 39, no. 7, pp. 1125-1144, Jul. 2003
    • (2003) Automatica , vol.39 , Issue.7 , pp. 1125-1144
    • Dion, J.1    Commault, C.2    Woude Der J.Van3
  • 26
    • 84871944240 scopus 로고    scopus 로고
    • False data injection attacks in control systems
    • [Online]
    • Y. Mo and B. Sinopoli, "False data injection attacks in control systems," in Proc. First Workshop Secure Control Syst., 2010. [Online]. Available: https://www.truststc.org/conferences/10/CPSWeek/papers/scs1-paper-7. pdf
    • (2010) Proc. First Workshop Secure Control Syst
    • Mo, Y.1    Sinopoli, B.2
  • 27
    • 70349223800 scopus 로고    scopus 로고
    • Block-sparsity: Coherence and efficient recovery
    • Y. Eldar and H. Bolcskei, "Block-sparsity: Coherence and efficient recovery," in Proc. IEEE ICASSP'09, 2009, pp. 2885-2888.
    • (2009) Proc. IEEE ICASSP'09 , pp. 2885-2888
    • Eldar, Y.1    Bolcskei, H.2
  • 31
    • 80053157963 scopus 로고    scopus 로고
    • A graph-theoretical characterization of power network vulnerabilities
    • San Francisco, CA
    • F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in Proc. Amer. Control Conf., San Francisco, CA, 2011, pp. 3918-3923.
    • (2011) Proc. Amer. Control Conf , pp. 3918-3923
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.