-
1
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Lecture notes in computer science Springer Berlin, Heidelberg
-
S. Amin, A.A. Cárdenas, and S.S. Sastry Safe and secure networked control systems under denial-of-service attacks Hybrid systems: computation and control Lecture notes in computer science 2009 Springer Berlin, Heidelberg 31 45
-
(2009)
Hybrid Systems: Computation and Control
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.A.2
Sastry, S.S.3
-
2
-
-
77953044026
-
Stealthy deception attacks on water SCADA systems
-
HSCC'10 ACM New York, NY, USA
-
S. Amin, X. Litrico, S.S. Sastry, and A.M. Bayen Stealthy deception attacks on water SCADA systems Proc. of the 13th ACM int. conf. on hybrid systems: computation and control HSCC'10 2010 ACM New York, NY, USA
-
(2010)
Proc. of the 13th ACM Int. Conf. on Hybrid Systems: Computation and Control
-
-
Amin, S.1
Litrico, X.2
Sastry, S.S.3
Bayen, A.M.4
-
4
-
-
0003595806
-
-
Studies in applied mathematics SIAM Philadelphia, PA
-
S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan Linear matrix inequalities in system and control theory Studies in applied mathematics Vol. 15 1994 SIAM Philadelphia, PA
-
(1994)
Linear Matrix Inequalities in System and Control Theory
, vol.15
-
-
Boyd, S.1
El Ghaoui, L.2
Feron, E.3
Balakrishnan, V.4
-
5
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
ASIACCS'11 ACM New York, NY, USA
-
A. Cárdenas, S. Amin, Z. Lin, Y. Huang, C. Huang, and S. Sastry Attacks against process control systems: risk assessment, detection, and response Proceedings of the 6th ACM symposium on information, computer and communications security ASIACCS'11 2011 ACM New York, NY, USA 355 366
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.1
Amin, S.2
Lin, Z.3
Huang, Y.4
Huang, C.5
Sastry, S.6
-
6
-
-
85084140752
-
Research challenges for the security of control systems
-
San Jose, CA, USA, July
-
Cárdenas, A.A.; Amin, S.; Sastry, S.S. (2008). Research challenges for the security of control systems. In Proc. 3rd USENIX workshop on hot topics in security, San Jose, CA, USA, July.
-
(2008)
Proc. 3rd USENIX Workshop on Hot Topics in Security
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.S.3
-
9
-
-
77957783940
-
Cyber attack in a two-area power system: Impact identification using reachability
-
July
-
Esfahani, P.; Vrakopoulou, M.; Margellos, K.; Lygeros, J.; Andersson, G. (2010). Cyber attack in a two-area power system: Impact identification using reachability. In American control conference, 2010, July (pp. 962-967).
-
(2010)
American Control Conference
, pp. 962-967
-
-
Esfahani, P.1
Vrakopoulou, M.2
Margellos, K.3
Lygeros, J.4
Andersson, G.5
-
11
-
-
0031378596
-
Survey of robust residual generation and evaluation methods in observer-based fault detection systems
-
P.M. Frank, and X. Ding Survey of robust residual generation and evaluation methods in observer-based fault detection systems Journal of Process Control 7 6 1997 403 424
-
(1997)
Journal of Process Control
, vol.7
, Issue.6
, pp. 403-424
-
-
Frank, P.M.1
Ding, X.2
-
12
-
-
70449412262
-
The VIKING project: An initiative on resilient control of power networks
-
Idaho Falls, ID, USA, August
-
Giani, A.; Sastry, S.; Johansson, K.H.; Sandberg, H. (2009). The VIKING project: an initiative on resilient control of power networks. In Proc. 2nd int. symp. on resilient control systems, Idaho Falls, ID, USA, August.
-
(2009)
Proc. 2nd Int. Symp. on Resilient Control Systems
-
-
Giani, A.1
Sastry, S.2
Johansson, K.H.3
Sandberg, H.4
-
13
-
-
70549106029
-
Electricity grid in US penetrated by spies
-
S. Gorman Electricity grid in US penetrated by spies The Wall Street Journal 2009 A1
-
(2009)
The Wall Street Journal
, pp. A1
-
-
Gorman, S.1
-
14
-
-
79953130034
-
Optimal control in the presence of an intelligent jammer with limited actions
-
Atlanta, GA, USA, December
-
Gupta, A.; Langbort, C.; Başar, T. (2010). Optimal control in the presence of an intelligent jammer with limited actions. In Proc. of the 49th IEEE conf. on decision and control, Atlanta, GA, USA, December.
-
(2010)
Proc. of the 49th IEEE Conf. on Decision and Control
-
-
Gupta, A.1
Langbort, C.2
Başar, T.3
-
15
-
-
0035576919
-
Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints
-
J.B. Hiriart-Urruty Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints Journal of Global Optimization 21 4 2001 443 453
-
(2001)
Journal of Global Optimization
, vol.21
, Issue.4
, pp. 443-453
-
-
Hiriart-Urruty, J.B.1
-
16
-
-
77951880498
-
A survey of fault detection, isolation, and reconfiguration methods
-
I. Hwang, S. Kim, Y. Kim, and C.E. Seah A survey of fault detection, isolation, and reconfiguration methods IEEE Transactions on Control Systems Technology 18 3 2010 636 653
-
(2010)
IEEE Transactions on Control Systems Technology
, vol.18
, Issue.3
, pp. 636-653
-
-
Hwang, I.1
Kim, S.2
Kim, Y.3
Seah, C.E.4
-
19
-
-
0033704177
-
The quadruple-tank process: A multivariable laboratory process with an adjustable zero
-
K.H. Johansson The quadruple-tank process: a multivariable laboratory process with an adjustable zero IEEE Transactions on Control Systems Technology 8 3 2000 456 465
-
(2000)
IEEE Transactions on Control Systems Technology
, vol.8
, Issue.3
, pp. 456-465
-
-
Johansson, K.H.1
-
20
-
-
84880966286
-
Consensus in the presence of an adversary
-
Santa Barbara, CA, USA, September
-
Khanafer, A.; Touri, B.; Başar, T. (2012). Consensus in the presence of an adversary. In Proc. 3rd IFAC workshop on estimation and control of networked systems, NecSys'12, Santa Barbara, CA, USA, September.
-
(2012)
Proc. 3rd IFAC Workshop on Estimation and Control of Networked Systems, NecSys'12
-
-
Khanafer, A.1
Touri, B.2
Başar, T.3
-
21
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Gaithersburg, MD, USA, October
-
Kosut, O.; Jia, L.; Thomas, R.; Tong, L. (2010). Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In Proceedings of the first IEEE international conference on smart grid communications, Gaithersburg, MD, USA, October.
-
(2010)
Proceedings of the First IEEE International Conference on Smart Grid Communications
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
22
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL, USA, November
-
Liu, Y.; Reiter, M. K.; Ning, P. (2009). False data injection attacks against state estimation in electric power grids. In Proc. 16th ACM conf. on computer and communications security, Chicago, IL, USA, November.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
23
-
-
77949601382
-
Secure control against replay attack
-
Allerton, IL, USA, October
-
Mo, Y.; Sinopoli, B. (2009). Secure control against replay attack. In Proceedings of the 47th annual Allerton conference on communication, control, and computing, Allerton, IL, USA, October.
-
(2009)
Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing
-
-
Mo, Y.1
Sinopoli, B.2
-
24
-
-
84860619819
-
Integrity attacks on cyber-physical systems
-
Beijing, China
-
Mo, Y.; Sinopoli, B. (2012). Integrity attacks on cyber-physical systems. In Proc. 1st international conference on high confidence networked systems, CPSWeek 2012, Beijing, China (pp. 47-54).
-
(2012)
Proc. 1st International Conference on High Confidence Networked Systems, CPSWeek 2012
, pp. 47-54
-
-
Mo, Y.1
Sinopoli, B.2
-
25
-
-
84863519982
-
Design and implementation of secure networked predictive control systems under deception attacks
-
Z.-H. Pang, and G.-P. Liu Design and implementation of secure networked predictive control systems under deception attacks IEEE Transactions on Control Systems Technology 20 5 2012 1334 1342
-
(2012)
IEEE Transactions on Control Systems Technology
, vol.20
, Issue.5
, pp. 1334-1342
-
-
Pang, Z.-H.1
Liu, G.-P.2
-
26
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Orlando, FL, USA, December
-
Pasqualetti, F.; Dorfler, F.; Bullo, F. (2011). Cyber-physical attacks in power networks: models, fundamental limitations and monitor design. In Proc. of the 50th IEEE conf. on decision and control and European control conference, Orlando, FL, USA, December.
-
(2011)
Proc. of the 50th IEEE Conf. on Decision and Control and European Control Conference
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
27
-
-
84858221367
-
Cyber war will not take place
-
T. Rid Cyber war will not take place Journal of Strategic Studies 35 1 2011 5 32
-
(2011)
Journal of Strategic Studies
, vol.35
, Issue.1
, pp. 5-32
-
-
Rid, T.1
-
28
-
-
84857229064
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, April
-
Sandberg, H.; Teixeira, A.; Johansson, K.H. (2010). On security indices for state estimators in power networks. In Preprints of the first workshop on secure control systems, CPSWEEK 2010, Stockholm, Sweden, April.
-
(2010)
Preprints of the First Workshop on Secure Control Systems, CPSWEEK 2010
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
29
-
-
67349236204
-
To zero or to hold control inputs with lossy links?
-
L. Schenato To zero or to hold control inputs with lossy links? IEEE Transactions on Automatic Control 54 5 2009 1093 1099
-
(2009)
IEEE Transactions on Automatic Control
, vol.54
, Issue.5
, pp. 1093-1099
-
-
Schenato, L.1
-
30
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. Sastry Foundations of control and estimation over lossy networks Proceedings of the IEEE 95 1 2007 163 187
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.5
-
31
-
-
84866745498
-
A decoupled feedback structure for covertly appropriating networked control systems
-
Milano, Italy, August-September
-
Smith, R. (2011). A decoupled feedback structure for covertly appropriating networked control systems. In Proc. of the 18th IFAC world congress, Milano, Italy, August-September.
-
(2011)
Proc. of the 18th IFAC World Congress
-
-
Smith, R.1
-
32
-
-
84155167085
-
Cyber-physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu Cyber-physical system security for the electric power grid Proceedings of the IEEE 100 1 2012 210 224
-
(2012)
Proceedings of the IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
33
-
-
84867399954
-
A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
-
S. Sundaram, S. Revzen, and G. Pappas A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks Automatica 48 11 2012 2894 2901
-
(2012)
Automatica
, vol.48
, Issue.11
, pp. 2894-2901
-
-
Sundaram, S.1
Revzen, S.2
Pappas, G.3
-
34
-
-
84866769548
-
Cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
-
Milano, Italy, August-September
-
Teixeira, A.; Dán, G.; Sandberg, H.; Johansson, K.H. (2011). Cyber security study of a SCADA energy management system: stealthy deception attacks on the state estimator. In Proc. of the 18th IFAC world congress, Milano, Italy, August-September.
-
(2011)
Proc. of the 18th IFAC World Congress
-
-
Teixeira, A.1
Dán, G.2
Sandberg, H.3
Johansson, K.H.4
-
35
-
-
84860632284
-
Attack models and scenarios for networked control systems
-
Beijing, China
-
Teixeira, A.; Pérez, D.; Sandberg, H.; Johansson, K. H. (2012). Attack models and scenarios for networked control systems. In Proc. 1st international conference on high confidence networked systems, CPSWeek 2012, Beijing, China.
-
(2012)
Proc. 1st International Conference on High Confidence Networked Systems, CPSWeek 2012
-
-
Teixeira, A.1
Pérez, D.2
Sandberg, H.3
Johansson, K.H.4
-
36
-
-
84869427279
-
Optimal power flow: Closing the loop over corrupted data
-
Montreal, Canada, June
-
Teixeira, A.; Sandberg, H.; Dán, G.; Johansson, K. H. (2012). Optimal power flow: closing the loop over corrupted data. In Proc. American control conference, Montreal, Canada, June.
-
(2012)
Proc. American Control Conference
-
-
Teixeira, A.1
Sandberg, H.2
Dán, G.3
Johansson, K.H.4
-
37
-
-
84875701366
-
Revealing stealthy attacks in control systems
-
Allerton, IL, USA, October
-
Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K. H. (2012). Revealing stealthy attacks in control systems. In Proceedings of the 50th annual Allerton conference on communication, control, and computing, Allerton, IL, USA, October.
-
(2012)
Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing
-
-
Teixeira, A.1
Shames, I.2
Sandberg, H.3
Johansson, K.H.4
-
38
-
-
79955998041
-
False data injection attacks in electricity markets
-
Gaithersburg, MD, USA, October
-
Xie, L.; Mo, Y.; Sinopoli, B. (2010). False data injection attacks in electricity markets. In Proceedings of the first IEEE international conference on smart grid communications, Gaithersburg, MD, USA, October.
-
(2010)
Proceedings of the First IEEE International Conference on Smart Grid Communications
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
40
-
-
0036530317
-
A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems
-
X. Zhang, M. Polycarpou, and T. Parisini A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems IEEE Transactions on Automatic Control 47 4 2002 576 593
-
(2002)
IEEE Transactions on Automatic Control
, vol.47
, Issue.4
, pp. 576-593
-
-
Zhang, X.1
Polycarpou, M.2
Parisini, T.3
-
41
-
-
0003585352
-
-
Prentice-Hall, Inc. Upper Saddle River, NJ, USA
-
K. Zhou, J.C. Doyle, and K. Glover Robust and optimal control 1996 Prentice-Hall, Inc. Upper Saddle River, NJ, USA
-
(1996)
Robust and Optimal Control
-
-
Zhou, K.1
Doyle, J.C.2
Glover, K.3
|