-
2
-
-
0017022844
-
A survey of design methods for failure detection in dynamic systems
-
nov.
-
A. Willsky, "A survey of design methods for failure detection in dynamic systems," Automatica, vol. 12, pp. 601-611, Nov. 1976
-
(1976)
Automatica
, vol.12
, pp. 601-611
-
-
Willsky, A.1
-
4
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, M. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inform. Syst. Secur., vol. 14, no. 1, pp. 13:1-13:33, 2011
-
(2011)
ACM Trans. Inform. Syst. Secur.
, vol.14
, Issue.1
, pp. 1301-1333
-
-
Liu, Y.1
Reiter, M.2
Ning, P.3
-
5
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, paper 10
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in Proc. 1st Workshop Secure Control Systems, Stockholm, Sweden, 2010, paper 10
-
(2010)
Proc. 1st Workshop Secure Control Systems
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
6
-
-
84887278643
-
Attack detection and identification in cyber-physical systems
-
F. Pasqualetti, F. Dorer, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Trans. Autom. Contr., vol. 58, no. 11, pp. 2715-2729, 2013
-
(2013)
IEEE Trans. Autom. Contr.
, vol.58
, Issue.11
, pp. 2715-2729
-
-
Pasqualetti, F.1
Dorer, F.2
Bullo, F.3
-
7
-
-
84901474949
-
Secure estimation and control for cyber-physical systems under adversarial attacks
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure estimation and control for cyber-physical systems under adversarial attacks," IEEE Trans. Autom. Contr., vol. 59, no. 6, pp. 1454-1467, 2014
-
(2014)
IEEE Trans. Autom. Contr.
, vol.59
, Issue.6
, pp. 1454-1467
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
8
-
-
79953144412
-
The wireless control network: Monitoring for malicious behavior
-
Atlanta, Georgia, Dec.
-
S. Sundaram, M. Pajic, C. Hadjicostis, R. Mangharam, and G. J. Pappas, "The wireless control network: Monitoring for malicious behavior," in Proc. IEEE Conf. Decision Control, Atlanta, Georgia, Dec. 2010, pp. 5979-5984
-
(2010)
Proc. IEEE Conf. Decision Control
, pp. 5979-5984
-
-
Sundaram, S.1
Pajic, M.2
Hadjicostis, C.3
Mangharam, R.4
Pappas, G.J.5
-
9
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
S. Sundaram and C. N. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Trans. Autom. Contr., vol. 56, no. 7, pp. 1495-1508, 2011
-
(2011)
IEEE Trans. Autom. Contr.
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
10
-
-
84855392746
-
Consensus computation in unreliable networks: A system theoretic approach
-
Jan.
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Trans. Autom. Contr., vol. 57, no. 1, pp. 90-104, Jan. 2012
-
(2012)
IEEE Trans. Autom. Contr.
, vol.57
, Issue.1
, pp. 90-104
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
11
-
-
84883504789
-
False data injection attacks in cyber physical systems
-
Stockholm, Sweden, Apr. paper 7
-
Y. Mo and B. Sinopoli, "False data injection attacks in cyber physical systems," in Proc. 1st Workshop Secure Control Systems, Stockholm, Sweden, Apr. 2010, paper 7
-
(2010)
Proc. 1st Workshop Secure Control Systems
-
-
Mo, Y.1
Sinopoli, B.2
-
12
-
-
79953146655
-
False data injection attacks against state estimation in wireless sensor networks
-
Atlanta, GA
-
Y. Mo, E. Garone, A. Casavola, and B. Sinopoli, "False data injection attacks against state estimation in wireless sensor networks," in Proc. 49th IEEE Conf. Decision Control, Atlanta, GA, 2010, pp. 5967-5972
-
(2010)
Proc. 49th IEEE Conf. Decision Control
, pp. 5967-5972
-
-
Mo, Y.1
Garone, E.2
Casavola, A.3
Sinopoli, B.4
-
13
-
-
77949601382
-
Secure control against replay attacks
-
Allerton, IL
-
Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Proc. 47th Annu. Allerton Conf. Communication, Control, Computing, Allerton, IL, 2009, pp. 911-918
-
(2009)
Proc. 47th Annu. Allerton Conf. Communication, Control, Computing
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
14
-
-
84903302626
-
Detecting integrity attacks on SCADA systems
-
Y. Mo, R. Chabukswar, and B. Sinopoli, "Detecting integrity attacks on SCADA systems," IEEE Trans. Control Syst. Technol., vol. 22, no. 4, pp. 1396-1407, 2014
-
(2014)
IEEE Trans. Control Syst. Technol.
, vol.22
, Issue.4
, pp. 1396-1407
-
-
Mo, Y.1
Chabukswar, R.2
Sinopoli, B.3
-
15
-
-
0003691637
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
P. Kumar and P. Varaiya, Stochastic Systems: Estimation, Identification, and Adaptive Control. Englewood Cliffs, NJ: Prentice-Hall, 1986
-
(1986)
Stochastic Systems: Estimation, Identification, and Adaptive Control
-
-
Kumar, P.1
Varaiya, P.2
-
16
-
-
0015126334
-
An innovations approach to fault detection and diagnosis in dynamic systems
-
sept.
-
R. K. Mehra and J. Peschon, "An innovations approach to fault detection and diagnosis in dynamic systems," Automatica, vol. 7, no. 5, pp. 637-640, Sept. 1971
-
(1971)
Automatica
, vol.7
, Issue.5
, pp. 637-640
-
-
Mehra, R.K.1
Peschon, J.2
-
20
-
-
0017950714
-
Orthogonal polynomial matrices on the unit circle
-
P. Delsarte, Y. Genin, and Y. Kamp, "Orthogonal polynomial matrices on the unit circle," IEEE Trans. Circuits Syst., vol. 25, no. 3, pp. 149-160, 1978
-
(1978)
IEEE Trans. Circuits Syst.
, vol.25
, Issue.3
, pp. 149-160
-
-
Delsarte, P.1
Genin, Y.2
Kamp, Y.3
-
22
-
-
36849072045
-
Graph implementations for nonsmooth convex programs
-
V. Blondel, S. Boyd, and H. Kimura, Eds. Berlin Heidelberg, Germany: Springer-Verlag
-
M. Grant and S. Boyd, "Graph implementations for nonsmooth convex programs," in Recent Advances in Learning and Control (Series Lecture Notes in Control and Information Sciences, vol. 371), V. Blondel, S. Boyd, and H. Kimura, Eds. Berlin Heidelberg, Germany: Springer-Verlag, 2008, pp. 95-110.
-
(2008)
Recent Advances in Learning and Control (Series Lecture Notes in Control and Information Sciences
, vol.371
, pp. 95-110
-
-
Grant, M.1
Boyd, S.2
|