메뉴 건너뛰기




Volumn , Issue , 2013, Pages 5444-5449

Optimal DoS attack policy against remote state estimation

Author keywords

[No Author keywords available]

Indexed keywords

EMBEDDED SYSTEMS; INTRUSION DETECTION; STATE ESTIMATION;

EID: 84902349715     PISSN: 07431546     EISSN: 25762370     Source Type: Conference Proceeding    
DOI: 10.1109/CDC.2013.6760746     Document Type: Conference Paper
Times cited : (65)

References (22)
  • 2
    • 84871946423 scopus 로고    scopus 로고
    • An online optimization approach for control and communication co-design in networked cyber-physical systems
    • X. Cao, P. Cheng, J. Chen, and Y. Sun, "An online optimization approach for control and communication co-design in networked cyber-physical systems, " IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 439-450, 2013.
    • (2013) IEEE Transactions on Industrial Informatics , vol.9 , Issue.1 , pp. 439-450
    • Cao, X.1    Cheng, P.2    Chen, J.3    Sun, Y.4
  • 5
    • 44449132515 scopus 로고    scopus 로고
    • Development of an integrated wireless sensor network micro-environmental monitoring system
    • X. Cao, J. Chen, Y. Zhang, and Y. Sun, "Development of an integrated wireless sensor network micro-environmental monitoring system, " ISA transactions, vol. 47, no. 3, pp. 247-255, 2008.
    • (2008) ISA Transactions , vol.47 , Issue.3 , pp. 247-255
    • Cao, X.1    Chen, J.2    Zhang, Y.3    Sun, Y.4
  • 6
    • 79251616434 scopus 로고    scopus 로고
    • Stuxnet and the future of cyber war
    • J. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war, " Survival, vol. 53, no. 1 pp. 23-40, 2011.
    • (2011) Survival , vol.53 , Issue.1 , pp. 23-40
    • Farwell, J.1    Rohozinski, R.2
  • 7
    • 31544436627 scopus 로고    scopus 로고
    • Denial-of-service attack detection techniques
    • G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack detection techniques, " IEEE Internet Computing, vol. 10, no. 1, pp. 82 - 89, 2006.
    • (2006) IEEE Internet Computing , vol.10 , Issue.1 , pp. 82-89
    • Carl, G.1    Kesidis, G.2    Brooks, R.3    Rai, S.4
  • 9
    • 67650109811 scopus 로고    scopus 로고
    • Safe and secure networked control systems under denial-of-service attacks
    • S. Amin, A. Cardenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks, " Hybrid Systems: Computation and Control, pp. 31-45, 2009.
    • (2009) Hybrid Systems: Computation and Control , pp. 31-45
    • Amin, S.1    Cardenas, A.2    Sastry, S.3
  • 14
    • 0022914591 scopus 로고
    • Solutions to a class of minimax decision problems arising in communication systems
    • T. Basar and Y. Wu, "Solutions to a class of minimax decision problems arising in communication systems, " Journal of optimization theory and applications, vol. 51, no. 3, pp. 375-404, 1986.
    • (1986) Journal of Optimization Theory and Applications , vol.51 , Issue.3 , pp. 375-404
    • Basar, T.1    Wu, Y.2
  • 15
    • 34249965400 scopus 로고
    • Communication games with partially soft power constraints
    • R. Bansal and T. Basar, "Communication games with partially soft power constraints, " Journal of optimization theory and applications, vol. 61, no. 3, pp. 329-346, 1989.
    • (1989) Journal of Optimization Theory and Applications , vol.61 , Issue.3 , pp. 329-346
    • Bansal, R.1    Basar, T.2
  • 18
    • 84859978401 scopus 로고    scopus 로고
    • Optimal sensor power scheduling for state estimation of gauss-Markov systems over a packet-dropping network
    • L. Shi and L. Xie, "Optimal sensor power scheduling for state estimation of gauss-markov systems over a packet-dropping network, " IEEE Transactions on Signal Processing, vol. 60, no. 5, pp. 2701- 2705, 2012.
    • (2012) IEEE Transactions on Signal Processing , vol.60 , Issue.5 , pp. 2701-2705
    • Shi, L.1    Xie, L.2
  • 19
    • 84902324535 scopus 로고    scopus 로고
    • Optimal periodic sensor schedule for steady-state estimation under average transmission energy constraint
    • to appear
    • Z. Ren, P. Cheng, J. Chen, L. Shi and Y. Sun, " Optimal periodic sensor schedule for steady-state estimation under average transmission energy constraint, " IEEE Transactions on Automatic Control, to appear.
    • IEEE Transactions on Automatic Control
    • Ren, Z.1    Cheng, P.2    Chen, J.3    Shi, L.4    Sun, Y.5
  • 20
    • 79960919898 scopus 로고    scopus 로고
    • Sensor data scheduling for optimal state estimation with communication energy constraint
    • L. Shi, P. Cheng, and J. Chen, "Sensor data scheduling for optimal state estimation with communication energy constraint, " Automatica, vol. 47, no. 8, pp. 1693-1698, 2011.
    • (2011) Automatica , vol.47 , Issue.8 , pp. 1693-1698
    • Shi, L.1    Cheng, P.2    Chen, J.3
  • 22
    • 84892987914 scopus 로고    scopus 로고
    • A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network
    • P. Sharma, N. Sharma, and R. Singh, "A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network, " International Journal of Computer Applications, vol. 41, no. 21, pp. 16-21, 2012.
    • (2012) International Journal of Computer Applications , vol.41 , Issue.21 , pp. 16-21
    • Sharma, P.1    Sharma, N.2    Singh, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.