-
1
-
-
49649119406
-
Cyber physical systems: Design challenges
-
May
-
E. A. Lee, "Cyber physical systems: Design challenges," in Proc. 11th IEEE ISORC, May 2008, pp. 363-369.
-
(2008)
Proc. 11th IEEE ISORC
, pp. 363-369
-
-
Lee, E.A.1
-
2
-
-
80051905885
-
A silent attack, but not a subtle one
-
55176, Sep.
-
J. Markoff, "A silent attack, but not a subtle one," New York Times, vol. 160, no. 55176, pp. 1-6, Sep. 2010.
-
(2010)
New York Times
, vol.160
, pp. 1-6
-
-
Markoff, J.1
-
3
-
-
84867315484
-
Obama order sped up wave of cyberattacks against Iran
-
55789, Jun.
-
D. E. Sanger, "Obama order sped up wave of cyberattacks against Iran," New York Times, vol. 161, no. 55789, Jun. 2012.
-
(2012)
New York Times
, vol.161
-
-
Sanger, D.E.1
-
4
-
-
84855841267
-
-
(May). [Online]
-
J. Carlin. (1997, May). A Farewell to Arms [Online]. Available: http://www.wired.com/wired/archive/5.05/netizen.html
-
(1997)
A Farewell to Arms
-
-
Carlin, J.1
-
5
-
-
22344444992
-
The myths and facts behind cyber security risks for industrial control systems
-
Oct.
-
E. J. Byres and J. Lowe, "The myths and facts behind cyber security risks for industrial control systems," in Proc. VDE Congr., vol. 116. Oct. 2004, pp. 1-6.
-
(2004)
Proc. VDE Congr.
, vol.116
, pp. 1-6
-
-
Byres, E.J.1
Lowe, J.2
-
6
-
-
85084140752
-
Research challenges for the security of control systems
-
Mar.
-
A. A. Cárdenas, S. Amin, and S. S. Sastry, "Research challenges for the security of control systems," in Proc. 3rd Conf. Hot Topics Sec., Mar. 2008, pp. 1-6.
-
(2008)
Proc. 3rd Conf. Hot Topics Sec.
, pp. 1-6
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.S.3
-
7
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Jun.
-
A. A. Cárdenas, S. Amin, and S. S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Proc. 28th ICDCS, Jun. 2008, pp. 495-500.
-
(2008)
Proc. 28th ICDCS
, pp. 495-500
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.S.3
-
8
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
S. Amin, A. A. Cárdenas, and S. S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in Proc. 12th Int. Conf. Hybrid Syst. Comput. Control, 2009, pp. 31-45.
-
(2009)
Proc. 12th Int. Conf. Hybrid Syst. Comput. Control
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.A.2
Sastry, S.S.3
-
9
-
-
4644285836
-
Kalman filtering with intermittent observations
-
Sep.
-
B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. I. Jordan, and S. S. Sastry, "Kalman filtering with intermittent observations," IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1453-1464, Sep. 2004.
-
(2004)
IEEE Trans. Autom. Control
, vol.49
, Issue.9
, pp. 1453-1464
-
-
Sinopoli, B.1
Schenato, L.2
Franceschetti, M.3
Poolla, K.4
Jordan, M.I.5
Sastry, S.S.6
-
10
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
Jan.
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, "Foundations of control and estimation over lossy networks," Proc. IEEE, vol. 95, no. 1, pp. 163-187, Jan. 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.S.5
-
11
-
-
0017022844
-
A survey of design methods for failure detection in dynamic systems
-
Nov.
-
A. S. Willsky, "A survey of design methods for failure detection in dynamic systems," Automatica, vol. 12, no. 6, pp. 601-611, Nov. 1975.
-
(1975)
Automatica
, vol.12
, Issue.6
, pp. 601-611
-
-
Willsky, A.S.1
-
12
-
-
0025793003
-
Stochastic robustness of linear timeinvariant control systems
-
Jan.
-
R. F. Stengel and L. R. Ray, "Stochastic robustness of linear timeinvariant control systems," IEEE Trans. Autom. Control, vol. 36, no. 1, pp. 82-87, Jan. 1991.
-
(1991)
IEEE Trans. Autom. Control
, vol.36
, Issue.1
, pp. 82-87
-
-
Stengel, R.F.1
Ray, L.R.2
-
13
-
-
1542288809
-
A game theoretic approach to decision and analysis in network intrusion detection
-
Dec.
-
T. Alpcan and T. Başar, "A game theoretic approach to decision and analysis in network intrusion detection," in Proc. 42nd IEEE Conf. Decision Control, vol. 3. Dec. 2003, pp. 2595-2600.
-
(2003)
Proc. 42nd IEEE Conf. Decision Control
, vol.3
, pp. 2595-2600
-
-
Alpcan, T.1
Başar, T.2
-
14
-
-
84871735046
-
Structural controllability and observability of linear systems over finite fields with applications to multi-agent systems
-
Jan.
-
S. Sundaram and C. N. Hadjicostis, "Structural controllability and observability of linear systems over finite fields with applications to multi-agent systems," IEEE Trans. Autom. Control, vol. 58, no. 1, pp. 60-73, Jan. 2013.
-
(2013)
IEEE Trans. Autom. Control
, vol.58
, Issue.1
, pp. 60-73
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
15
-
-
84866469313
-
SeRLoc: Robust localization for wireless sensor networks
-
Aug.
-
L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Trans. Sensor Netw., vol. 1, no. 1, pp. 73-100, Aug. 2005.
-
(2005)
ACM Trans. Sensor Netw.
, vol.1
, Issue.1
, pp. 73-100
-
-
Lazos, L.1
Poovendran, R.2
-
16
-
-
33144472023
-
ROPE: Robust position estimation in wireless sensor networks
-
L. Lazos, R. Poovendran, and S. Čapkun, "ROPE: Robust position estimation in wireless sensor networks," in Proc. 4th Int. Symp. Inf. Process. Sensor Netw., 2005, pp. 1-8.
-
(2005)
Proc. 4th Int. Symp. Inf. Process. Sensor Netw.
, pp. 1-8
-
-
Lazos, L.1
Poovendran, R.2
Čapkun, S.3
-
17
-
-
62749205479
-
Distributed intrusion detection for secure consensus computations
-
DOI 10.1109/CDC.2007.4434297, 4434297, Proceedings of the 46th IEEE Conference on Decision and Control 2007, CDC
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Distributed intrusion detection for secure consensus computations," in Proc. 46th IEEE Conf. Decision Control, Dec. 2007, pp. 5594-5599. (Pubitemid 351278031)
-
(2007)
Proceedings of the IEEE Conference on Decision and Control
, pp. 5594-5599
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
18
-
-
84874233151
-
Cyber-physical security via geometric control: Distributed monitoring and malicious attacks
-
Dec.
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical security via geometric control: Distributed monitoring and malicious attacks," in Proc. IEEE Conf. Decision Control, Dec. 2012, pp. 1-8.
-
(2012)
Proc. IEEE Conf. Decision Control
, pp. 1-8
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
19
-
-
84860664369
-
Attack-resilient distributed formation control via online adaptation
-
Dec.
-
M. Zhu and S. Martínez, "Attack-resilient distributed formation control via online adaptation," in Proc. 50th IEEE CDC-ECC, Dec. 2011, pp. 6624-6629.
-
(2011)
Proc. 50th IEEE CDC-ECC
, pp. 6624-6629
-
-
Zhu, M.1
Martínez, S.2
-
20
-
-
70449412262
-
The VIKING project: An initiative on resilient control of power networks
-
Aug.
-
A. Giani, S. S. Sastry, K. H. Johansson, and H. Sandberg, "The VIKING project: An initiative on resilient control of power networks," in Proc. 2nd ISRCS, Aug. 2009, pp. 31-35.
-
(2009)
Proc. 2nd ISRCS
, pp. 31-35
-
-
Giani, A.1
Sastry, S.S.2
Johansson, K.H.3
Sandberg, H.4
-
21
-
-
64149124758
-
A survey of recent results in networked control systems
-
Jan.
-
J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, "A survey of recent results in networked control systems," Proc. IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.1
, pp. 138-162
-
-
Hespanha, J.P.1
Naghshtabrizi, P.2
Xu, Y.3
-
22
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
Oct.
-
G. Dán and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. 1st IEEE Int. Conf. Smart Grid Commun., Oct. 2010, pp. 214-219.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun.
, pp. 214-219
-
-
Dán, G.1
Sandberg, H.2
-
23
-
-
84155170617
-
On security indices for state estimators in power networks
-
Apr.
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in Proc. 1st Workshop Secure Control Syst., Cyber Phys. Syst., Apr. 2010, pp. 1-6.
-
(2010)
Proc. 1st Workshop Secure Control Syst., Cyber Phys. Syst.
, pp. 1-6
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
24
-
-
84856082215
-
Secure state-estimation for dynamical systems under active adversaries
-
Sep.
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure state-estimation for dynamical systems under active adversaries," in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput., Sep. 2011, pp. 337-344.
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 337-344
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
25
-
-
84899741426
-
-
Ithaca, NY, USA: Cornell Univ. Press, May
-
H. Fawzi, P. Tabuada, and S. Diggavi, Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks. Ithaca, NY, USA: Cornell Univ. Press, May 2012.
-
(2012)
Secure Estimation and Control for Cyber-Physical Systems under Adversarial Attacks
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
26
-
-
77949601382
-
Secure control against replay attacks
-
Oct.
-
Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Proc. 47th Annu. Allerton Conf. Commun., Control, Comput., Oct. 2009, pp. 911-918.
-
(2009)
Proc. 47th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
27
-
-
84903277281
-
Detecting integrity attacks on SCADA systems
-
Mar.
-
R. Chabukswar, Y. Mo, and B. Sinopoli, "Detecting integrity attacks on SCADA systems," in Proc. 18th World Congr. IFAC, Mar. 2011, pp. 1-6.
-
(2011)
Proc. 18th World Congr. IFAC
, pp. 1-6
-
-
Chabukswar, R.1
Mo, Y.2
Sinopoli, B.3
-
28
-
-
81055128075
-
Israeli test on worm called crucial in Iran nuclear delay
-
55287, Jan.
-
W. J. Broad, J. Markoff, and D. E. Sanger, "Israeli test on worm called crucial in Iran nuclear delay," New York Times, vol. 160, no. 55287, p. 1, Jan. 2011.
-
(2011)
New York Times
, vol.160
, pp. 1
-
-
Broad, W.J.1
Markoff, J.2
Sanger, D.E.3
-
29
-
-
0015126334
-
An innovations approach to fault detection and diagnosis in dynamic systems
-
Sep.
-
R. K. Mehra and J. Peschon, "An innovations approach to fault detection and diagnosis in dynamic systems," Automatica, vol. 7, no. 5, pp. 637-640, Sep. 1971.
-
(1971)
Automatica
, vol.7
, Issue.5
, pp. 637-640
-
-
Mehra, R.K.1
Peschon, J.2
-
31
-
-
0003611103
-
-
Reading, MA, USA: Addison-Wesley
-
L. L. Scharf and C. Demeure, Statistical Signal Processing: Detection, Estimation and Time Series Analysis. Reading, MA, USA: Addison-Wesley, 1991.
-
(1991)
Statistical Signal Processing: Detection, Estimation and Time Series Analysis
-
-
Scharf, L.L.1
Demeure, C.2
-
32
-
-
0027561446
-
A plant-wide industrial process control problem
-
Jan.
-
J. J. Downs and E. F. Vogel, "A plant-wide industrial process control problem," Comput. Chem. Eng., vol. 17, no. 3, pp. 245-255, Jan. 1993.
-
(1993)
Comput. Chem. Eng.
, vol.17
, Issue.3
, pp. 245-255
-
-
Downs, J.J.1
Vogel, E.F.2
-
33
-
-
0006747307
-
Model predictive control of a continuous, nonlinear, two-phase reactor
-
Sep.
-
N. L. Ricker, "Model predictive control of a continuous, nonlinear, two-phase reactor," J. Process Control, vol. 3, no. 2, pp. 109-123, Sep. 1995.
-
(1995)
J. Process Control
, vol.3
, Issue.2
, pp. 109-123
-
-
Ricker, N.L.1
|