-
2
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Jun
-
A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops, Jun. 2008, pp. 495-500.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 495-500
-
-
Cardenas, A.1
Amin, S.2
Sastry, S.3
-
3
-
-
77956364473
-
A prototype architecture for cyberphysical systems
-
Jan
-
Y. Tan, S. Goddard, and L. C. Perez, "A prototype architecture for cyberphysical systems," ACM SIGBED Rev., vol. 5, no. 1, Jan. 2008, pp. 1-2.
-
(2008)
ACM SIGBED Rev
, vol.5
, Issue.1
, pp. 1-2
-
-
Tan, Y.1
Goddard, S.2
Perez, L.C.3
-
5
-
-
77953723898
-
Modeling of future cyber-physical energy systems for distributed sensing and control
-
Jul
-
M. D. Ilic L. Xie, U. A. Khan, and J. M. F. Moura, "Modeling of future cyber-physical energy systems for distributed sensing and control," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 4, pp. 825-838, Jul. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.40
, Issue.4
, pp. 825-838
-
-
Ilic L Xie, M.D.1
Khan, U.A.2
Moura, J.M.F.3
-
6
-
-
77956217277
-
Cyber-physical systems: The next computing revolution
-
Jul
-
R. (R.) Rajkumar, I. Lee, L. Sha, and J. Stankovic, "Cyber-physical systems: The next computing revolution," in Proc. 47th ACM/IEEE Des. Autom. Conf., Jul. 2010, pp. 731-736.
-
(2010)
Proc. 47th ACM/IEEE Des. Autom. Conf
, pp. 731-736
-
-
Rajkumar, R.1
Lee, I.2
Sha, L.3
Stankovic, J.4
-
7
-
-
84870349845
-
-
Oak Ridge National Laboratory, Oak Ridge, TN, USA, Tech. Rep. ORNL/TM-2010/30, Apr
-
R. A. Kisner, W. Manges, L. MacIntyre, J. Nutaro, J. Munro, Jr, P. Ewing, M. Howlader, P. Kuruganti, R. Wallace, and M. Olama, "Cybersecurity through real-time distributed control systems," Oak Ridge National Laboratory, Oak Ridge, TN, USA, Tech. Rep. ORNL/TM-2010/30, Apr. 2010.
-
(2010)
Cybersecurity Through Real-time Distributed Control Systems
-
-
Kisner, R.A.1
Manges, W.2
Macintyre, L.3
Nutaro, J.4
Munro, J.5
Ewing, P.6
Howlader, M.7
Kuruganti, P.8
Wallace, R.9
Olama, M.10
-
8
-
-
80055028776
-
Challenges for securing cyber physical systems
-
to be published
-
A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. S. Sastry, "Challenges for securing cyber physical systems," in Proc. 1st Workshop Cyber-Physical Syst. Security, 2009, to be published.
-
(2009)
Proc. 1st Workshop Cyber-Physical Syst. Security
-
-
Cardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.S.6
-
9
-
-
84862085483
-
Continuous assurance for cyber physical system security
-
Newark, NJ, USA, Jul
-
C. Codella, A. Hampapur, C.-S. Li, D. Pendarakis, and J. R. Rao, "Continuous assurance for cyber physical system security," in Proc. 1st Workshop Future Directions Cyber-Phys. Syst. Security (CPSSW), Newark, NJ, USA, Jul. 2009.
-
(2009)
Proc. 1st Workshop Future Directions Cyber-Phys. Syst. Security (CPSSW)
-
-
Codella, C.1
Hampapur, A.2
Li, C.-S.3
Pendarakis, D.4
Rao, J.R.5
-
10
-
-
77953695984
-
Cybersecurity for critical infrastructures: Attack and defense modeling
-
Jul
-
C.-W. Ten, G. Manimaran, and C.-C. Liu, "Cybersecurity for critical infrastructures: Attack and defense modeling," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 40, no. 4, pp. 853-865, Jul. 2010.
-
(2010)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.40
, Issue.4
, pp. 853-865
-
-
Ten, C.-W.1
Manimaran, G.2
Liu, C.-C.3
-
11
-
-
33847767196
-
Safeguarding scada systems with anomaly detection
-
Berlin, Germany: Springer
-
J. Bigham, D. Gamez, and N. Lu, "Safeguarding SCADA systems with anomaly detection," in Computer Network Security, vol. 2776, Berlin, Germany: Springer, 2003, pp. 171-182.
-
(2003)
Computer Network Security
, vol.2776
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
12
-
-
34047126237
-
Anomaly-based intrusion detection for scada systems
-
Albuquerque, NM, USA, Nov
-
D. Yang, A. Usynin, and J. W. Hines, "Anomaly-based intrusion detection for SCADA systems," in Proc. 5th Int. Topical Meeting Nucl. Plant Instrum., Control Human Mach. Inter. Technol. (NPIC&HMIT), Albuquerque, NM, USA, Nov. 2006.
-
(2006)
Proc. 5th Int. Topical Meeting Nucl. Plant Instrum., Control Human Mach. Inter. Technol. (NPIC&HMIT)
-
-
Yang, D.1
Usynin, A.2
Hines, J.W.3
-
13
-
-
84864644307
-
Anomaly detection in wireless sensor networks
-
Oct
-
S. Rajasegarar, C. Leckie, and M. Palaniswami, "Anomaly detection in wireless sensor networks," in Proc. 10th IEEE Singapore Int. Conf. Commun. Syst., Oct. 2006, pp. 1-5.
-
(2006)
Proc. 10th IEEE Singapore Int. Conf. Commun. Syst
, pp. 1-5
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
-
14
-
-
71849108397
-
Multi-disciplinary challenges and directions in networked cyber-physical systems
-
Austin, TX, USA, Oct
-
M. S. Branicky, M. Cavusoglu, and V. Liberatore, "Multi-disciplinary challenges and directions in networked cyber-physical systems," in Proc. NSF Workshop Cyber-Phys. Syst., Austin, TX, USA, Oct. 2006.
-
(2006)
Proc. NSF Workshop Cyber-Phys. Syst
-
-
Branicky, M.S.1
Cavusoglu, M.2
Liberatore, V.3
-
15
-
-
77954775495
-
Engineering future cyberphysical energy systems: Challenges, research needs, and roadmap
-
T. H. Morris, A. K. Srivastava, B. Reaves, K. Pavurapu, S. Abdelwahed, R. Vaughn, W. McGrew, and Y. Dandass, "Engineering future cyberphysical energy systems: Challenges, research needs, and roadmap," in Proc. North American Power Symp., 2009, pp. 1-6.
-
(2009)
Proc. North American Power Symp
, pp. 1-6
-
-
Morris, T.H.1
Srivastava, A.K.2
Reaves, B.3
Pavurapu, K.4
Abdelwahed, S.5
Vaughn, R.6
McGrew, W.7
Dandass, Y.8
-
16
-
-
84857563249
-
Challenges in security for cyber-physical systems
-
Newark, NJ, USA, Jul
-
C. Neuman, "Challenges in security for cyber-physical systems," in Proc. DHS Workshop Future Directions Cyber-Phys. Syst. Security, Newark, NJ, USA, Jul. 2009.
-
(2009)
Proc. DHS Workshop Future Directions Cyber-Phys. Syst. Security
-
-
Neuman, C.1
-
17
-
-
84862887667
-
Cyber-physical systems security - Challenges and research ideas
-
Jul
-
P. Pal, R. Schantz, K. Rohloff, and J. Loyall, "Cyber-physical systems security - Challenges and research ideas," in Proc. Workshop Future Directions Cyber-Physical Syst. Security, Jul. 2009.
-
(2009)
Proc. Workshop Future Directions Cyber-Physical Syst. Security
-
-
Pal, P.1
Schantz, R.2
Rohloff, K.3
Loyall, J.4
-
18
-
-
81555214762
-
-
Ph.D. dissertation, Dept. Elect. Comput. Eng., Utah State Univ., Logan, UT, USA, Apr
-
C. Tricaud, "Optimal sensing and actuation policies for networked mobile agents in a class of cyber-physical systems," Ph.D. dissertation, Dept. Elect. Comput. Eng., Utah State Univ., Logan, UT, USA, Apr. 2010.
-
(2010)
Optimal Sensing and Actuation Policies for Networked Mobile Agents in A Class of Cyber-physical Systems
-
-
Tricaud, C.1
-
19
-
-
58449121064
-
Self-organizing networked systems for technical applications: A discussion on open issues
-
Berlin, Germany: Springer
-
W. Elmenreich and H. De Meer, "Self-organizing networked systems for technical applications: A discussion on open issues," in Self-Organizing Systems, vol. 5343. Berlin, Germany: Springer, 2008, pp. 1-9.
-
(2008)
Self-Organizing Systems
, vol.5343
, pp. 1-9
-
-
Elmenreich, W.1
De Meer, H.2
-
21
-
-
64149124758
-
A survey of recent results in networked control systems
-
Jan
-
J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, "A survey of recent results in networked control systems," Proc. IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.1
, pp. 138-162
-
-
Hespanha, J.P.1
Naghshtabrizi, P.2
Xu, Y.3
-
22
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
Jan
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, "Foundations of control and estimation over lossy networks," Proc. IEEE, vol. 95, no. 1, pp. 163-187, Jan. 2007.
-
(2007)
Proc. IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.S.5
-
23
-
-
0346372495
-
-
Berlin Germany: Springer- Verlag, Sep
-
M. Blanke, M. Kinnaert, J. Lunze, and M. Staroswiecki, Diagnosis and Fault-Tolerant Control. Berlin, Germany: Springer-Verlag, Sep. 2003.
-
(2003)
Diagnosis and Fault-Tolerant Control
-
-
Blanke, M.1
Kinnaert, M.2
Lunze, J.3
Staroswiecki, M.4
-
25
-
-
79953768093
-
Taxonomy of attacks on wireless sensor networks
-
S. Han, E. Chang, L. Gao, and T. Dillon, "Taxonomy of attacks on wireless sensor networks," in Proc. 1st Eur. Conf. Comput. Netw. Defence, 2005, pp. 97-105.
-
(2005)
Proc. 1st Eur. Conf. Comput. Netw. Defence
, pp. 97-105
-
-
Han, S.1
Chang, E.2
Gao, L.3
Dillon, T.4
-
26
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, vol. 35, no. 10, pp. 54-62, 2002.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
30
-
-
42449117164
-
Guide to intrusion detection and prevention systems (idps)
-
Gaithersburg, MD, USA, Feb., Paper 800-94
-
K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems (IDPS)," Computer Security Resource Center, National Institute of Standards and Technology, Gaithersburg, MD, USA, Feb. 2007, Paper 800-94.
-
(2007)
Computer Security Resource Center, National Institute of Standards and Technology
-
-
Scarfone, K.1
Mell, P.2
-
31
-
-
68049121093
-
Anomaly detection: A survey
-
Jul
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Comput. Surveys, vol. 41, no. 3, pp. 15-58, Jul. 2009.
-
(2009)
ACM Comput. Surveys
, vol.41
, Issue.3
, pp. 15-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
32
-
-
7544223741
-
A survey of outlier detection methodologies
-
V. J. Hodge and J. Austin, "A survey of outlier detection methodologies," Artif. Intell. Rev., vol. 22, no. 2, pp. 85-126, 2004.
-
(2004)
Artif. Intell. Rev
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.J.1
Austin, J.2
-
33
-
-
14344259796
-
Distributed deviation detection in sensor networks
-
Dec
-
S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, "Distributed deviation detection in sensor networks," SIGMOD Rec., vol. 32, no. 4, pp. 77-82, Dec. 2003.
-
(2003)
SIGMOD Rec
, vol.32
, Issue.4
, pp. 77-82
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
Bezdek, J.C.4
-
34
-
-
35248830261
-
Online outlier detection in sensor data using non-parametric models
-
Sep
-
S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos, "Online outlier detection in sensor data using non-parametric models," in Proc. 32nd Int. Conf. Very Large Data Bases, Sep. 2006, pp. 187-198.
-
(2006)
Proc. 32nd Int. Conf. Very Large Data Bases
, pp. 187-198
-
-
Subramaniam, S.1
Palpanas, T.2
Papadopoulos, D.3
Kalogeraki, V.4
Gunopulos, D.5
-
35
-
-
38549109147
-
Quarter sphere based distributed anomaly detection in wireless sensor networks
-
Oct
-
S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, "Quarter sphere based distributed anomaly detection in wireless sensor networks," in Proc. IEEE Int. Conf. Commun., Oct. 2006, pp. 3864-3869.
-
(2006)
Proc. IEEE Int. Conf. Commun
, pp. 3864-3869
-
-
Rajasegarar, S.1
Leckie, C.2
Palaniswami, M.3
Bezdek, J.C.4
-
36
-
-
77950926173
-
Anomaly detection by clustering ellipsoids in wireless sensor networks
-
Dec
-
M. Moshtaghi, S. Rajasegarar, C. Leckie, and S. Karunasekera, "Anomaly detection by clustering ellipsoids in wireless sensor networks," in Proc. Int. Conf. Intell. Sensors, Sensor Netw. Inf. Process., Dec. 2009, pp. 331-336.
-
(2009)
Proc. Int. Conf. Intell. Sensors, Sensor Netw. Inf. Process
, pp. 331-336
-
-
Moshtaghi, M.1
Rajasegarar, S.2
Leckie, C.3
Karunasekera, S.4
-
37
-
-
34548324813
-
Multivariate online anomaly detection using kernel recursive least squares
-
May
-
T. Ahmed, M. Coates, and A. Lakhina, "Multivariate online anomaly detection using kernel recursive least squares," in Proc. 26th IEEE Int. Conf. Comput. Commun., May 2007, pp. 625-633.
-
(2007)
Proc. 26th IEEE Int. Conf. Comput. Commun
, pp. 625-633
-
-
Ahmed, T.1
Coates, M.2
Lakhina, A.3
-
38
-
-
34548364110
-
Insider attacker detection in wireless sensor networks
-
May
-
F. Liu, X. Cheng, and D. Chen, "Insider attacker detection in wireless sensor networks," in Proc. 26th IEEE Int. Conf. Comput. Commun., May 2007, pp. 1937-1945.
-
(2007)
Proc. 26th IEEE Int. Conf. Comput. Commun
, pp. 1937-1945
-
-
Liu, F.1
Cheng, X.2
Chen, D.3
-
40
-
-
38149140244
-
A rough set based anomaly detection scheme considering the age of user profiles
-
Berlin, Germany: Springer
-
I.-H. Bae, "A rough set based anomaly detection scheme considering the age of user profiles," in Computation Science, vol. 4490, Berlin, Germany: Springer, 2007, pp. 558-561.
-
(2007)
Computation Science
, vol.4490
, pp. 558-561
-
-
Bae, I.-H.1
-
41
-
-
77958529680
-
On bounding data stream privacy in distributed cyber-physical systems
-
Jun
-
N. Pham, T. Abdelzaher, and S. Nath, "On bounding data stream privacy in distributed cyber-physical systems," in Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Comput., Jun. 2010, pp. 221-228.
-
(2010)
Proc. IEEE Int. Conf. Sensor Netw., Ubiquitous, Trustworthy Comput
, pp. 221-228
-
-
Pham, N.1
Abdelzaher, T.2
Nath, S.3
-
42
-
-
50949110438
-
Cyber-physical systems: A new frontier
-
Jun
-
L. Sha, S. Gopalakrishnan, X. Liu, and Q. Wang, "Cyber-physical systems: A new frontier," in Proc. 18th IEEE Int. Conf. Sensor Netw., Ubiquitous Trustworthy Comput., Jun. 2008, pp. 1-9.
-
(2008)
Proc. 18th IEEE Int. Conf. Sensor Netw., Ubiquitous Trustworthy Comput
, pp. 1-9
-
-
Sha, L.1
Gopalakrishnan, S.2
Liu, X.3
Wang, Q.4
-
43
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
Apr
-
W. R. Pires, Jr., T. H. de Paula Figueiredo, H. C. Wong, and A. A. F. Loureiro, "Malicious node detection in wireless sensor networks," in Proc. 18th Int. Parallel Distrib. Process. Symp., Apr. 2004.
-
(2004)
Proc. 18th Int. Parallel Distrib. Process. Symp
-
-
Pires, W.R.1
De Paula Figueiredo, T.H.2
Wong, H.C.3
Loureiro, A.A.F.4
-
45
-
-
48149090928
-
Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
-
Nov
-
D. Dallas, C. Leckie, and K. Ramamohanarao, "Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks," in Proc. 15th IEEE Int. Conf. Netw., Nov. 2007, pp. 176-181.
-
(2007)
Proc. 15th IEEE Int. Conf. Netw
, pp. 176-181
-
-
Dallas, D.1
Leckie, C.2
Ramamohanarao, K.3
-
47
-
-
77954606031
-
Time-based intrusion detection in cyber-physical systems
-
Apr
-
C. Zimmer, B. Bhat, F. Mueller, and S. Mohan, "Time-based intrusion detection in cyber-physical systems," in Proc. 1st ACM/IEEE Int. Conf. Cyber-Physical Syst., Apr. 2010, pp. 109-118.
-
(2010)
Proc. 1st ACM/IEEE Int. Conf. Cyber-Physical Syst
, pp. 109-118
-
-
Zimmer, C.1
Bhat, B.2
Mueller, F.3
Mohan, S.4
-
49
-
-
48249143566
-
A product machine model for anomaly detection of interposition attacks on cyber-physical systems
-
C. Bellettini and J. L. Rrushi, "A product machine model for anomaly detection of interposition attacks on cyber-physical systems," in Proc. 23rd Int. Inform. Security Conf., vol. 278. 2008, pp. 285-300.
-
(2008)
Proc. 23rd Int. Inform. Security Conf
, vol.278
, pp. 285-300
-
-
Bellettini, C.1
Rrushi, J.L.2
-
51
-
-
79956116601
-
Anomaly detection in wireless sensor networks: A survey
-
M. Xie, S. Han, and B. Tian, "Anomaly detection in wireless sensor networks: A survey," J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1302-1325, 2011.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.4
, pp. 1302-1325
-
-
Xie, M.1
Han, S.2
Tian, B.3
|