-
1
-
-
80055028776
-
Challenges for securing cyber physical systems
-
A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig and S. Sastry, "Challenges for securing cyber physical systems." in Workshop on Future Directions in Cyber-physical Systems Security, 2009.
-
(2009)
Workshop on Future Directions in Cyber-physical Systems Security
-
-
Cardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
2
-
-
84871946423
-
An online optimization approach for control and communication co-design in networked cyber-physical systems
-
X. Cao, P. Cheng, J. Chen, and Y. Sun, "An online optimization approach for control and communication co-design in networked cyber-physical systems, " IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 439-450, 2013.
-
(2013)
IEEE Transactions on Industrial Informatics
, vol.9
, Issue.1
, pp. 439-450
-
-
Cao, X.1
Cheng, P.2
Chen, J.3
Sun, Y.4
-
3
-
-
84875053216
-
Sensing-performance tradeoff in cognitive radio enabled smart grid
-
R. Deng, J. Chen, X. Cao, Y. Zhang, S. Maharjan, and S. Gjessing, "Sensing-performance tradeoff in cognitive radio enabled smart grid, " IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 302-310, 2013.
-
(2013)
IEEE Transactions on Smart Grid
, vol.4
, Issue.1
, pp. 302-310
-
-
Deng, R.1
Chen, J.2
Cao, X.3
Zhang, Y.4
Maharjan, S.5
Gjessing, S.6
-
5
-
-
44449132515
-
Development of an integrated wireless sensor network micro-environmental monitoring system
-
X. Cao, J. Chen, Y. Zhang, and Y. Sun, "Development of an integrated wireless sensor network micro-environmental monitoring system, " ISA transactions, vol. 47, no. 3, pp. 247-255, 2008.
-
(2008)
ISA Transactions
, vol.47
, Issue.3
, pp. 247-255
-
-
Cao, X.1
Chen, J.2
Zhang, Y.3
Sun, Y.4
-
6
-
-
79251616434
-
Stuxnet and the future of cyber war
-
J. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war, " Survival, vol. 53, no. 1 pp. 23-40, 2011.
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.1
Rohozinski, R.2
-
7
-
-
31544436627
-
Denial-of-service attack detection techniques
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attack detection techniques, " IEEE Internet Computing, vol. 10, no. 1, pp. 82 - 89, 2006.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
8
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
May
-
M. Strasser, S. Capkun, C. Popper and M. Cagalj, " Jamming-resistant key establishment using uncoordinated frequency hopping, " in IEEE Symposium on Security and Privacy, May 2008, pp. 64 -78.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
Strasser, M.1
Capkun, S.2
Popper, C.3
Cagalj, M.4
-
9
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
S. Amin, A. Cardenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks, " Hybrid Systems: Computation and Control, pp. 31-45, 2009.
-
(2009)
Hybrid Systems: Computation and Control
, pp. 31-45
-
-
Amin, S.1
Cardenas, A.2
Sastry, S.3
-
10
-
-
84855700411
-
Launching denial-of-service jamming attacks in underwater sensor networks
-
M. Zuba, Z. Shi, Z. Peng, and J. Cui, Launching denial-of-service jamming attacks in underwater sensor networks; in Proceedings of the 6th ACM International Workshop on Underwater Networks, 2011, p. 12.
-
(2011)
Proceedings of the 6th ACM International Workshop on Underwater Networks
, pp. 12
-
-
Zuba, M.1
Shi, Z.2
Peng, Z.3
Cui, J.4
-
12
-
-
79953146655
-
False data injection attacks against state estimation in wireless sensor networks
-
Dec
-
Y. Mo, E. Garone, A. Casavola, and B. Sinopoli, " False data injection attacks against state estimation in wireless sensor networks, " in IEEE Conference on Decision and Control (CDC), Dec. 2010, pp. 5967 - 5972.
-
(2010)
IEEE Conference on Decision and Control (CDC)
, pp. 5967-5972
-
-
Mo, Y.1
Garone, E.2
Casavola, A.3
Sinopoli, B.4
-
13
-
-
84860632284
-
Attack models and scenarios for networked control systems
-
A. Teixeira, D. Perez, H. Sandberg, and K. H. Johansson, "Attack models and scenarios for networked control systems, " in Proceedings of the 1st international conference on High Confidence Networked Systems, 2012, pp. 55-64.
-
(2012)
Proceedings of the 1st International Conference on High Confidence Networked Systems
, pp. 55-64
-
-
Teixeira, A.1
Perez, D.2
Sandberg, H.3
Johansson, K.H.4
-
14
-
-
0022914591
-
Solutions to a class of minimax decision problems arising in communication systems
-
T. Basar and Y. Wu, "Solutions to a class of minimax decision problems arising in communication systems, " Journal of optimization theory and applications, vol. 51, no. 3, pp. 375-404, 1986.
-
(1986)
Journal of Optimization Theory and Applications
, vol.51
, Issue.3
, pp. 375-404
-
-
Basar, T.1
Wu, Y.2
-
15
-
-
34249965400
-
Communication games with partially soft power constraints
-
R. Bansal and T. Basar, "Communication games with partially soft power constraints, " Journal of optimization theory and applications, vol. 61, no. 3, pp. 329-346, 1989.
-
(1989)
Journal of Optimization Theory and Applications
, vol.61
, Issue.3
, pp. 329-346
-
-
Bansal, R.1
Basar, T.2
-
16
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
-
Y. Law, M. Palaniswami, L. Hoesel, J. Doumen, P. Hartel, and P. Havinga, " Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols, " ACM Transactions on Sensor Networks (TOSN), vol. 5, no. 1, p. 6, 2009.
-
(2009)
ACM Transactions on Sensor Networks (TOSN)
, vol.5
, Issue.1
, pp. 6
-
-
Law, Y.1
Palaniswami, M.2
Hoesel, L.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
17
-
-
85084140752
-
Research challenges for the security of control systems
-
A. Cardenas, S. Amin, and S. Sastry, "Research challenges for the security of control systems, " in Proceedings of the 3rd conference on Hot topics in security, 2008, pp. 1-6.
-
(2008)
Proceedings of the 3rd Conference on Hot Topics in Security
, pp. 1-6
-
-
Cardenas, A.1
Amin, S.2
Sastry, S.3
-
18
-
-
84859978401
-
Optimal sensor power scheduling for state estimation of gauss-Markov systems over a packet-dropping network
-
L. Shi and L. Xie, "Optimal sensor power scheduling for state estimation of gauss-markov systems over a packet-dropping network, " IEEE Transactions on Signal Processing, vol. 60, no. 5, pp. 2701- 2705, 2012.
-
(2012)
IEEE Transactions on Signal Processing
, vol.60
, Issue.5
, pp. 2701-2705
-
-
Shi, L.1
Xie, L.2
-
19
-
-
84902324535
-
Optimal periodic sensor schedule for steady-state estimation under average transmission energy constraint
-
to appear
-
Z. Ren, P. Cheng, J. Chen, L. Shi and Y. Sun, " Optimal periodic sensor schedule for steady-state estimation under average transmission energy constraint, " IEEE Transactions on Automatic Control, to appear.
-
IEEE Transactions on Automatic Control
-
-
Ren, Z.1
Cheng, P.2
Chen, J.3
Shi, L.4
Sun, Y.5
-
20
-
-
79960919898
-
Sensor data scheduling for optimal state estimation with communication energy constraint
-
L. Shi, P. Cheng, and J. Chen, "Sensor data scheduling for optimal state estimation with communication energy constraint, " Automatica, vol. 47, no. 8, pp. 1693-1698, 2011.
-
(2011)
Automatica
, vol.47
, Issue.8
, pp. 1693-1698
-
-
Shi, L.1
Cheng, P.2
Chen, J.3
-
21
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks, " in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, 2005, pp. 46-57.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
22
-
-
84892987914
-
A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network
-
P. Sharma, N. Sharma, and R. Singh, "A secure intrusion detection system against ddos attack in wireless mobile ad-hoc network, " International Journal of Computer Applications, vol. 41, no. 21, pp. 16-21, 2012.
-
(2012)
International Journal of Computer Applications
, vol.41
, Issue.21
, pp. 16-21
-
-
Sharma, P.1
Sharma, N.2
Singh, R.3
|