메뉴 건너뛰기




Volumn 35, Issue 1, 2015, Pages 82-92

Covert misappropriation of networked control systems: Presenting a feedback structure

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEMS;

EID: 84921500356     PISSN: 1066033X     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCS.2014.2364723     Document Type: Article
Times cited : (247)

References (15)
  • 2
    • 84887278643 scopus 로고    scopus 로고
    • Attack detection and identification in cyber-physical systems
    • F. Pasqualetti, F. Dorfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Trans. Autom. Contr., vol. 58, no. 11, pp. 2715-2729, 2013
    • (2013) IEEE Trans. Autom. Contr. , vol.58 , Issue.11 , pp. 2715-2729
    • Pasqualetti, F.1    Dorfler, F.2    Bullo, F.3
  • 3
    • 33750405289 scopus 로고    scopus 로고
    • Security issues in SCADA networks
    • V. Igure, S. Laughter, and R. Williams, "Security issues in SCADA networks," Comput. Secur., vol. 25, no. 7, pp. 498-506, 2006
    • (2006) Comput. Secur. , vol.25 , Issue.7 , pp. 498-506
    • Igure, V.1    Laughter, S.2    Williams, R.3
  • 4
    • 84897628591 scopus 로고    scopus 로고
    • Cyber security of water SCADA systems-Part I: Analysis and experimentation of stealthy deception attacks
    • S. Amin, X. Litrico, S. Sastry, and A. M. Bayen, "Cyber security of water SCADA systems-Part I: Analysis and experimentation of stealthy deception attacks," IEEE Trans. Control Syst. Technol., vol. 21, no. 5, pp. 1963-1970, 2013
    • (2013) IEEE Trans. Control Syst. Technol. , vol.21 , Issue.5 , pp. 1963-1970
    • Amin, S.1    Litrico, X.2    Sastry, S.3    Bayen, A.M.4
  • 5
    • 84897648424 scopus 로고    scopus 로고
    • Cyber security of water SCADA systems-Part II: Attack detection using enhanced hydrodynamic models
    • S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Cyber security of water SCADA systems-Part II: Attack detection using enhanced hydrodynamic models," IEEE Trans. Control Syst. Technol., vol. 21, no. 5, pp. 1679-1693, 2013
    • (2013) IEEE Trans. Control Syst. Technol. , vol.21 , Issue.5 , pp. 1679-1693
    • Amin, S.1    Litrico, X.2    Sastry, S.S.3    Bayen, A.M.4
  • 9
    • 84892599890 scopus 로고    scopus 로고
    • Data attack isolation in power networks using secure voltage magnitude measurements
    • K. C. Sou, H. Sandberg, and K. H. Johansson, "Data attack isolation in power networks using secure voltage magnitude measurements," IEEE Trans. Smart Grid, vol. 5, no. 1, pp. 14-28, 2014
    • (2014) IEEE Trans. Smart Grid , vol.5 , Issue.1 , pp. 14-28
    • Sou, K.C.1    Sandberg, H.2    Johansson, K.H.3
  • 11
    • 84866745498 scopus 로고    scopus 로고
    • A decoupled feedback structure for covertly appropriating networked control systems
    • Aug.
    • R. S. Smith, "A decoupled feedback structure for covertly appropriating networked control systems," in Proc. Int. Federation Automatic Control World Congr., Aug. 2011, pp. 90-95
    • (2011) Proc. Int. Federation Automatic Control World Congr , pp. 90-95
    • Smith, R.S.1
  • 12
    • 57349141487 scopus 로고    scopus 로고
    • MIMO Smith predictor: Global and structured robust performance analysis
    • R. Sánchez-Peña, Y. Bolea, and V. Puig, "MIMO Smith predictor: Global and structured robust performance analysis," J. Process Control, vol. 19, no. 1, pp. 163-177, 2009
    • (2009) J. Process Control , vol.19 , Issue.1 , pp. 163-177
    • Sánchez-Peña, R.1    Bolea, Y.2    Puig, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.