-
1
-
-
33646537114
-
GPS spoofing countermeasures
-
Los Alamos National Lab., Los Alamos, NM
-
Warner, J. S., and Johnston, R. G., "GPS Spoofing Countermeasures," Tech. Rept. LAUR-03-6163, Los Alamos National Lab., Los Alamos, NM, 2003.
-
(2003)
Tech. Rept. LAUR-03-6163
-
-
Warner, J.S.1
Johnston, R.G.2
-
2
-
-
77951065268
-
Independent ADS-BVerification and validation
-
AIAA Paper 2005-7351, Reston, VA
-
Krozel, J., and Andrisani, D. II, "Independent ADS-BVerification and Validation," AIAA 5th Aviation, Technology, Integration, and Operations Conference, AIAA Paper 2005-7351, Reston, VA, 2005, pp. 1-11.
-
(2005)
AIAA 5th Aviation, Technology, Integration, and Operations Conference
, pp. 1-11
-
-
Krozel, J.1
Andrisani II, D.2
-
3
-
-
84904130157
-
-
San Francisco, CA, July. [retrieved Oct. 2013]
-
Franceschi-Bicchierai, L., "GPS Hijacking Catches Feds, Drone Makers Off Guard," Wired, San Francisco, CA, July 2012, http://www.wired.com/ dangerroom/2012/07/drone-gps-spoof [retrieved Oct. 2013].
-
(2012)
GPS Hijacking Catches Feds, Drone Makers off Guard
-
-
Franceschi-Bicchierai, L.1
-
4
-
-
81755165352
-
-
San Francisco, CA, Oct. [retrieved Oct. 2013]
-
Schachtman, N., "Computer Virus Hits U.S. Drone Fleet," Wired, San Francisco, CA, Oct. 2011, http://www.wired.com/dangerroom/2011/10/virus- hitsdrone-fleet [retrieved Oct. 2013].
-
(2011)
Computer Virus Hits U.S. Drone Fleet
-
-
Schachtman, N.1
-
5
-
-
84904121754
-
-
U.S.-China Economic and Security Review Commission, Washington, D.C. [retrieved Oct. 2013]
-
"2011 Report to Congress," U.S.-China Economic and Security Review Commission, Washington, D.C., 2011, http://origin.www.uscc.gov/sites/ default/files/annual-reports/annual-report-full-11.pdf [retrieved Oct. 2013].
-
(2011)
2011 Report to Congress
-
-
-
6
-
-
77954171454
-
Insurgents hack U.S. Drones
-
New York, Dec. [retrieved Oct. 2013]
-
Gorman, S., Dreazen, Y. J., and Cole, A., "Insurgents Hack U.S. Drones," Wall Street Journal, New York, Dec. 2009, http://online.wsj.com/ article/SB126102247889095011.html [retrieved Oct. 2013].
-
(2009)
Wall Street Journal
-
-
Gorman, S.1
Dreazen, Y.J.2
Cole, A.3
-
7
-
-
84155165352
-
Ensuring safety, security, and sustainability of mission-critical cyber- physical systems
-
doi:10.1109/JPROC.2011.2165689
-
Banerjee, A., Venkatasubramanian, K. K., Mukherjee, T., and Gupta, S. K. S., "Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber- Physical Systems," Proceedings of the IEEE, Vol. 100, No. 1, 2011, pp. 283-299. doi:10.1109/JPROC.2011.2165689
-
(2011)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 283-299
-
-
Banerjee, A.1
Venkatasubramanian, K.K.2
Mukherjee, T.3
Gupta, S.K.S.4
-
8
-
-
78651579602
-
A defense-in-depth approach to securing thewireless vehicle infrastructure
-
doi:10.4304/jnw.4.7.552-564
-
Nilsson, D. K., and Larson, U. E., "A Defense-in-Depth Approach to Securing theWireless Vehicle Infrastructure," Journal of Networks, Vol. 4, No. 7, 2009, pp. 552-564. doi:10.4304/jnw.4.7.552-564
-
(2009)
Journal of Networks
, vol.4
, Issue.7
, pp. 552-564
-
-
Nilsson, D.K.1
Larson, U.E.2
-
9
-
-
11244293707
-
Rapid detection of faults for safety critical aircraft operation
-
1360, 2004 IEEE Aerospace Conference Proceedings
-
Goebel, K., Eklund, N., and Brunell, B., "Rapid Detection of Faults for Safety Critical Aircraft Operation," Proceedings of the 2004 IEEE Aerospace Conference, Vol. 5, IEEE Publ., Piscataway, NJ, 2004, pp. 3372-3383. (Pubitemid 40057196)
-
(2004)
IEEE Aerospace Conference Proceedings
, vol.5
, pp. 3372-3383
-
-
Goebel, K.1
Eklund, N.2
Brunell, B.3
-
10
-
-
77951880498
-
A survey of fault detection, isolation, and reconfiguration methods
-
doi:10.1109/TCST.2009.2026285
-
Hwang, I. S., Kim, Y. K., and Seah, C., "A Survey of Fault Detection, Isolation, and Reconfiguration Methods," IEEE Transactions on Control Systems Technology, Vol. 18, No. 3, 2010, pp. 636-653. doi:10.1109/TCST.2009.2026285
-
(2010)
IEEE Transactions on Control Systems Technology
, vol.18
, Issue.3
, pp. 636-653
-
-
Hwang, I.S.1
Kim, Y.K.2
Seah, C.3
-
11
-
-
77955963560
-
Research on security monitoring and health management system of medium-range UAV
-
IEEE Publ., Piscataway, NJ
-
Man, Q., Ma, S., Xia, L., andWang, Y., "Research on Security Monitoring and Health Management System of Medium-Range UAV," Proceedings of the 8th International Conference on Reliability, Maintainability and Safety, IEEE Publ., Piscataway, NJ, 2009, pp. 854-857.
-
(2009)
Proceedings of the 8th International Conference on Reliability, Maintainability and Safety
, pp. 854-857
-
-
Man, Q.1
Ma, S.2
Xia, L.3
Wang, Y.4
-
12
-
-
80053414377
-
A hierarchical security architecture for cyber-physical systems
-
IEEE Publ., Piscataway, NJ
-
Zhu, Q., Rieger, C., and Basar, T., "A Hierarchical Security Architecture for Cyber-Physical Systems," Proceedings of the 4th International Symposium on Resilient Control Systems, IEEE Publ., Piscataway, NJ, 2011, pp. 15-20.
-
(2011)
Proceedings of the 4th International Symposium on Resilient Control Systems
, pp. 15-20
-
-
Zhu, Q.1
Rieger, C.2
Basar, T.3
-
13
-
-
84874555938
-
Cyber security threat analysis and modeling of an unmanned aerial vehicle system
-
IEEE Publ., Piscataway, NJ
-
Javaid, A. Y., Sun, W., Devabhaktuni, V. K., and Alam, M., "Cyber Security Threat Analysis and Modeling of an Unmanned Aerial Vehicle System," Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security, IEEE Publ., Piscataway, NJ, 2012, pp. 585-590.
-
(2012)
Proceedings of the 2012 IEEE Conference on Technologies for Homeland Security
, pp. 585-590
-
-
Javaid, A.Y.1
Sun, W.2
Devabhaktuni, V.K.3
Alam, M.4
-
14
-
-
85088338101
-
Cyber attack vulnerabilities analysis for unmanned aerial vehicles
-
AIAA Paper 2012-2438, Reston, VA, June
-
Kim, A.,Wampler, B., Goppert, J., Hwang, I., and Aldridge, H., "Cyber AttackVulnerabilities Analysis for Unmanned AerialVehicles," Infotech@Aerospace 2012, AIAA Paper 2012-2438, Reston, VA, June 2012.
-
(2012)
Infotech@Aerospace 2012
-
-
Kim, A.1
Wampler, B.2
Goppert, J.3
Hwang, I.4
Aldridge, H.5
-
15
-
-
28244500560
-
Robustness analysis applied to autopilot design part 1: μ-Analysis of design entries to a robust flight control benchmark
-
Bonn, Germany
-
Looye, G.,Varga, A., Bennani, S., Moormann, D., and Grübel, G., "Robustness Analysis Applied to Autopilot Design Part 1: μ-Analysis of Design Entries to a Robust Flight Control Benchmark," Proceedings of 21st Congress of the International Council of Aeronautical Sciences, ICAS, Bonn, Germany, 1998.
-
(1998)
Proceedings of 21st Congress of the International Council of Aeronautical Sciences, ICAS
-
-
Looye, G.1
Varga, A.2
Bennani, S.3
Moormann, D.4
Grübel, G.5
-
16
-
-
52449105656
-
Uncertainty modeling and robustness analysis of flight control using m -analysis techniques
-
IEEE Publ., Piscataway, NJ
-
Zhao, X., and Zheng, Z., "Uncertainty Modeling and Robustness Analysis of Flight Control Using m -Analysis Techniques," Proceedings of the 3rd International Conference on Innovative Computing Information and Control, IEEE Publ., Piscataway, NJ, 2008.
-
(2008)
Proceedings of the 3rd International Conference on Innovative Computing Information and Control
-
-
Zhao, X.1
Zheng, Z.2
-
17
-
-
80052200215
-
Robustness analysis of unmanned helicopter flight control law using mu-analysis techniques
-
IEEE Publ., Piscataway, NJ
-
Tang, J.,Wei, C., and Meng,W., "Robustness Analysis of Unmanned Helicopter Flight Control Law Using mu-Analysis Techniques," Proceedings of the 6th IEEE Conference on Industrial Electronics and Applications, IEEE Publ., Piscataway, NJ, 2011, pp. 1283-1287.
-
(2011)
Proceedings of the 6th IEEE Conference on Industrial Electronics and Applications
, pp. 1283-1287
-
-
Tang, J.1
Wei, C.2
Meng, W.3
-
18
-
-
85087535913
-
Analysis of optimal false data injection attacks in unmanned aerial systems
-
AIAA Paper 2013-4653, Reston, VA, Aug.
-
Shull, A., and Hwang, I., "Analysis of Optimal False Data Injection Attacks in Unmanned Aerial Systems," Infotech@Aerospace 2013, AIAA Paper 2013- 4653, Reston, VA, Aug. 2013.
-
(2013)
Infotech@Aerospace 2013
-
-
Shull, A.1
Hwang, I.2
-
19
-
-
85088345877
-
Analytical analysis of cyber attacks on unmanned aerial systems
-
AIAA Paper 2013-5186, Reston, VA, Aug.
-
Kwon, C., and Hwang, I., "Analytical Analysis of Cyber Attacks on Unmanned Aerial Systems," AIAA Guidance, Navigation, and Control (GNC) Conference, AIAA Paper 2013-5186, Reston, VA, Aug. 2013.
-
(2013)
AIAA Guidance, Navigation, and Control (GNC) Conference
-
-
Kwon, C.1
Hwang, I.2
-
20
-
-
84883504054
-
Security analysis for cyber-physical systems against stealthy deception attacks
-
IEEE Publ., Piscataway, NJ
-
Kwon, C., Liu,W., and Hwang, I., "Security Analysis for Cyber-Physical Systems Against Stealthy Deception Attacks," Proceedings of the American Control Conference, IEEE Publ., Piscataway, NJ, 2013.
-
(2013)
Proceedings of the American Control Conference
-
-
Kwon, C.1
Liu, W.2
Hwang, I.3
-
21
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
IEEE Publ., Piscataway, NJ
-
Kosut, O., Jia, L., Thomas, R., andTong, L., "Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures," Proceedings of the 1st IEEE International Conference on Smart Grid Communications, IEEE Publ., Piscataway, NJ, 2010, pp. 220-225.
-
(2010)
Proceedings of the 1st IEEE International Conference on Smart Grid Communications
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
22
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
doi:10.1145/1952982.1952995
-
Liu, Y., Ning, P., and Reiter, M., "False Data Injection Attacks Against State Estimation in Electric Power Grids," ACM Transactions on Information and System Security, Vol. 14, No. 1, 2011, p. 13. doi:10.1145/1952982.1952995
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
23
-
-
85086949945
-
Cyber security analysis for state estimators in air traffic control systems
-
AIAA Paper 2012-4929, Reston, VA, Aug.
-
Liu,W., Kwon, C., Aljanabi, I., and Hwang, I., "Cyber Security Analysis for State Estimators in Air Traffic Control Systems," AIAA Guidance, Navigation, and Control Conference, AIAA Paper 2012-4929, Reston, VA, Aug. 2012.
-
(2012)
AIAA Guidance, Navigation, and Control Conference
-
-
Liu, W.1
Kwon, C.2
Aljanabi, I.3
Hwang, I.4
-
24
-
-
77949601382
-
Secure control against replay attacks
-
IEEE Publ., Piscataway, NJ
-
Mo, Y., and Sinopoli, B., "Secure Control Against Replay Attacks," Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, IEEE Publ., Piscataway, NJ, 2009, pp. 911-918.
-
(2009)
Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
25
-
-
84871944240
-
False data injection attacks in control systems
-
TRUST, Berkeley, CA
-
Mo, Y., and Sinopoli, B., "False Data Injection Attacks in Control Systems," Proceedings of the 1st Workshop on Secure Control Systems, TRUST, Berkeley, CA, 2010.
-
(2010)
Proceedings of the 1st Workshop on Secure Control Systems
-
-
Mo, Y.1
Sinopoli, B.2
-
26
-
-
79953146655
-
False data injection attacks against state estimation inwireless sensor networks
-
IEEE Publ., Piscataway, NJ
-
Mo, Y., Garone, E., Casavola, A., and Sinopoli, B., "False Data Injection Attacks Against State Estimation inWireless Sensor Networks," Proceedings of the 49th IEEE Conference on Decision and Control (CDC)," IEEE Publ., Piscataway, NJ, 2010, pp. 5967-5972.
-
(2010)
Proceedings of the 49th IEEE Conference on Decision and Control (CDC)
, pp. 5967-5972
-
-
Mo, Y.1
Garone, E.2
Casavola, A.3
Sinopoli, B.4
-
27
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
IEEE Publ., Piscataway, NJ
-
Teixeira, A., Amin, S., Sandberg, H., Johansson, K., and Sastry, S., "Cyber Security Analysis of State Estimators in Electric Power Systems," Proceedings of the 49th IEEE Conference on Decision and Control, IEEE Publ., Piscataway, NJ, 2010, pp. 5991-5998.
-
(2010)
Proceedings of the 49th IEEE Conference on Decision and Control
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.4
Sastry, S.5
-
28
-
-
76749100077
-
-
Artech House, Norwood, MA
-
Takanen, A., Demott, J. D., and Miller, C., Fuzzing for Software Security Testing and Quality Assurance, Artech House, Norwood, MA, 2008, pp. 22-32.
-
(2008)
Fuzzing for Software Security Testing and Quality Assurance
, pp. 22-32
-
-
Takanen, A.1
Demott, J.D.2
Miller, C.3
-
29
-
-
70449560388
-
Detecting spoofing attacks in mobile wireless environments
-
IEEE Publ., Piscataway, NJ
-
Yang, J., Chen, Y., and Trappe,W., "Detecting Spoofing Attacks in MobileWireless Environments," Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, IEEE Publ., Piscataway, NJ, 2009, pp. 1-9.
-
(2009)
Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks
, pp. 1-9
-
-
Yang, J.1
Chen, Y.2
Trappe, W.3
-
30
-
-
84858636380
-
A taxonomy of buffer overflow characteristics
-
doi:10.1109/TDSC.2012.10
-
Bishop, M., Engle, S., Howard, D., and Whalen, S., "A Taxonomy of Buffer Overflow Characteristics," IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 3, 2012, pp. 305-317. doi:10.1109/TDSC.2012.10
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 305-317
-
-
Bishop, M.1
Engle, S.2
Howard, D.3
Whalen, S.4
-
31
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
doi:10.1023/A:1024600519144
-
Zhang,Y., Lee,W., and Huang,Y.-A., "Intrusion Detection Techniques for MobileWireless Networks," Wireless Networks,Vol. 9, No. 5, 2003, pp. 545-556. doi:10.1023/A:1024600519144
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
32
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
IEEE Publ., Piscataway, NJ
-
Cowan, C.,Wagle, F., Pu, C., Beattie, S., andWalpole, J., "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade," Proceedings of the DARPA Information Survivability Conference and Exposition, Vol. 2, IEEE Publ., Piscataway, NJ, 2000, pp. 119-129.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 119-129
-
-
Cowan, C.1
Wagle, F.2
Pu, C.3
Beattie, S.4
Walpole, J.5
|