메뉴 건너뛰기




Volumn 51, Issue , 2015, Pages 135-148

A secure control framework for resource-limited adversaries

Author keywords

Attack space; Cyber physical systems; Secure control systems; System security

Indexed keywords

CONTROL SYSTEMS; DENIAL-OF-SERVICE ATTACK; EMBEDDED SYSTEMS; INVARIANCE; LINEAR SYSTEMS; NETWORK SECURITY; TIME VARYING CONTROL SYSTEMS;

EID: 84920703223     PISSN: 00051098     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.automatica.2014.10.067     Document Type: Article
Times cited : (975)

References (41)
  • 1
    • 67650109811 scopus 로고    scopus 로고
    • Safe and secure networked control systems under denial-of-service attacks
    • Lecture notes in computer science Springer Berlin, Heidelberg
    • S. Amin, A.A. Cárdenas, and S.S. Sastry Safe and secure networked control systems under denial-of-service attacks Hybrid systems: computation and control Lecture notes in computer science 2009 Springer Berlin, Heidelberg 31 45
    • (2009) Hybrid Systems: Computation and Control , pp. 31-45
    • Amin, S.1    Cárdenas, A.A.2    Sastry, S.S.3
  • 11
    • 0031378596 scopus 로고    scopus 로고
    • Survey of robust residual generation and evaluation methods in observer-based fault detection systems
    • P.M. Frank, and X. Ding Survey of robust residual generation and evaluation methods in observer-based fault detection systems Journal of Process Control 7 6 1997 403 424
    • (1997) Journal of Process Control , vol.7 , Issue.6 , pp. 403-424
    • Frank, P.M.1    Ding, X.2
  • 13
    • 70549106029 scopus 로고    scopus 로고
    • Electricity grid in US penetrated by spies
    • S. Gorman Electricity grid in US penetrated by spies The Wall Street Journal 2009 A1
    • (2009) The Wall Street Journal , pp. A1
    • Gorman, S.1
  • 14
  • 15
    • 0035576919 scopus 로고    scopus 로고
    • Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints
    • J.B. Hiriart-Urruty Global optimality conditions in maximizing a convex quadratic function under convex quadratic constraints Journal of Global Optimization 21 4 2001 443 453
    • (2001) Journal of Global Optimization , vol.21 , Issue.4 , pp. 443-453
    • Hiriart-Urruty, J.B.1
  • 19
    • 0033704177 scopus 로고    scopus 로고
    • The quadruple-tank process: A multivariable laboratory process with an adjustable zero
    • K.H. Johansson The quadruple-tank process: a multivariable laboratory process with an adjustable zero IEEE Transactions on Control Systems Technology 8 3 2000 456 465
    • (2000) IEEE Transactions on Control Systems Technology , vol.8 , Issue.3 , pp. 456-465
    • Johansson, K.H.1
  • 25
    • 84863519982 scopus 로고    scopus 로고
    • Design and implementation of secure networked predictive control systems under deception attacks
    • Z.-H. Pang, and G.-P. Liu Design and implementation of secure networked predictive control systems under deception attacks IEEE Transactions on Control Systems Technology 20 5 2012 1334 1342
    • (2012) IEEE Transactions on Control Systems Technology , vol.20 , Issue.5 , pp. 1334-1342
    • Pang, Z.-H.1    Liu, G.-P.2
  • 27
    • 84858221367 scopus 로고    scopus 로고
    • Cyber war will not take place
    • T. Rid Cyber war will not take place Journal of Strategic Studies 35 1 2011 5 32
    • (2011) Journal of Strategic Studies , vol.35 , Issue.1 , pp. 5-32
    • Rid, T.1
  • 29
    • 67349236204 scopus 로고    scopus 로고
    • To zero or to hold control inputs with lossy links?
    • L. Schenato To zero or to hold control inputs with lossy links? IEEE Transactions on Automatic Control 54 5 2009 1093 1099
    • (2009) IEEE Transactions on Automatic Control , vol.54 , Issue.5 , pp. 1093-1099
    • Schenato, L.1
  • 31
    • 84866745498 scopus 로고    scopus 로고
    • A decoupled feedback structure for covertly appropriating networked control systems
    • Milano, Italy, August-September
    • Smith, R. (2011). A decoupled feedback structure for covertly appropriating networked control systems. In Proc. of the 18th IFAC world congress, Milano, Italy, August-September.
    • (2011) Proc. of the 18th IFAC World Congress
    • Smith, R.1
  • 32
    • 84155167085 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • S. Sridhar, A. Hahn, and M. Govindarasu Cyber-physical system security for the electric power grid Proceedings of the IEEE 100 1 2012 210 224
    • (2012) Proceedings of the IEEE , vol.100 , Issue.1 , pp. 210-224
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 33
    • 84867399954 scopus 로고    scopus 로고
    • A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
    • S. Sundaram, S. Revzen, and G. Pappas A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks Automatica 48 11 2012 2894 2901
    • (2012) Automatica , vol.48 , Issue.11 , pp. 2894-2901
    • Sundaram, S.1    Revzen, S.2    Pappas, G.3
  • 34
    • 84866769548 scopus 로고    scopus 로고
    • Cyber security study of a SCADA energy management system: Stealthy deception attacks on the state estimator
    • Milano, Italy, August-September
    • Teixeira, A.; Dán, G.; Sandberg, H.; Johansson, K.H. (2011). Cyber security study of a SCADA energy management system: stealthy deception attacks on the state estimator. In Proc. of the 18th IFAC world congress, Milano, Italy, August-September.
    • (2011) Proc. of the 18th IFAC World Congress
    • Teixeira, A.1    Dán, G.2    Sandberg, H.3    Johansson, K.H.4
  • 40
    • 0036530317 scopus 로고    scopus 로고
    • A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems
    • X. Zhang, M. Polycarpou, and T. Parisini A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems IEEE Transactions on Automatic Control 47 4 2002 576 593
    • (2002) IEEE Transactions on Automatic Control , vol.47 , Issue.4 , pp. 576-593
    • Zhang, X.1    Polycarpou, M.2    Parisini, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.