-
2
-
-
77950343228
-
The day the samba stopped
-
Mar. 06-26
-
J. P. Conti, "The day the samba stopped," Eng. Technol., vol. 5, no. 4, pp. 46-47, Mar. 06-26, 2010
-
(2010)
Eng. Technol.
, vol.5
, Issue.4
, pp. 46-47
-
-
Conti, J.P.1
-
3
-
-
11044238440
-
SQL Slammer worm lessons learned for consideration by the electricity sector
-
Atlanta, GA, Tech. Rep.
-
S. Kuvshinkova, "SQL Slammer worm lessons learned for consideration by the electricity sector," North Amer. Elec. Reliab. Council, Atlanta, GA, Tech. Rep., 2003
-
(2003)
North Amer. Elec. Reliab. Council
-
-
Kuvshinkova, S.1
-
4
-
-
79251616434
-
Stuxnet and the future of cyber war
-
J. P. Farwell and R. Rohozinski, "Stuxnet and the future of cyber war," Survival, vol. 53, no. 1, pp. 23-40, 2011
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.P.1
Rohozinski, R.2
-
5
-
-
46749138780
-
Hackers vs slackers
-
G. Richards, "Hackers vs slackers," Eng. Technol., vol. 3, no. 19, pp. 40-43, 2008
-
(2008)
Eng. Technol.
, vol.3
, Issue.19
, pp. 40-43
-
-
Richards, G.1
-
6
-
-
77952887452
-
Security technology for smart grid networks
-
A. R. Metke and R. L. Ekl, "Security technology for smart grid networks," IEEE Trans. Smart Grid, vol. 1, no. 1, pp. 99-107, 2010
-
(2010)
IEEE Trans. Smart Grid
, vol.1
, Issue.1
, pp. 99-107
-
-
Metke, A.R.1
Ekl, R.L.2
-
7
-
-
85084140752
-
Research challenges for the security of control systems
-
Berkeley, CA
-
A. A. Cárdenas, S. Amin, and S. S. Sastry, "Research challenges for the security of control systems," in Proc. 3rd Conf. Hot Topics Security, Berkeley, CA, 2008, pp. 6:1-6:6
-
(2008)
Proc. 3rd Conf. Hot Topics Security
, pp. 61-66
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.S.3
-
8
-
-
0024626996
-
Failure detection and identification
-
M.-A. Massoumnia, G. C. Verghese, and A. S. Willsky, "Failure detection and identification," IEEE Trans. Autom. Contr., vol. 34, no. 3, pp. 316-321, 1989
-
(1989)
IEEE Trans. Autom. Contr.
, vol.34
, Issue.3
, pp. 316-321
-
-
Massoumnia, M.-A.1
Verghese, G.C.2
Willsky, A.S.3
-
10
-
-
84893372666
-
Timing of cyber conflict
-
R. Axelrod and R. Iliev, "Timing of cyber conflict," Proc. Natl. Acad. Sci., vol. 111, no. 4, pp. 1298-1303, 2014
-
(2014)
Proc. Natl. Acad. Sci.
, vol.111
, Issue.4
, pp. 1298-1303
-
-
Axelrod, R.1
Iliev, R.2
-
11
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Apr.
-
S. Amin, A. Cárdenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in Proc. Hybrid Systems: Computation Control, Apr. 2009, vol. 5469, pp. 31-45
-
(2009)
Proc. Hybrid Systems: Computation Control
, vol.5469
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.2
Sastry, S.3
-
12
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL, Nov.
-
Y. Liu, M. K. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in Proc. ACM Conf. Computer Communications Security, Chicago, IL, Nov. 2009, pp. 21-32
-
(2009)
Proc. ACM Conf. Computer Communications Security
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.K.2
Ning, P.3
-
13
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
Atlanta, GA, Dec.
-
A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. Sastry, "Cyber security analysis of state estimators in electric power systems," in Proc. IEEE Conf. Decision Control, Atlanta, GA, Dec. 2010, pp. 5991-5998
-
(2010)
Proc. IEEE Conf. Decision Control
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.H.4
Sastry, S.5
-
14
-
-
84875701366
-
Revealing stealthy attacks in control systems
-
Oct.
-
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, "Revealing stealthy attacks in control systems," in Proc. Allerton Conf. Communications, Control Computing, Oct. 2012, pp. 1806-1813
-
(2012)
Proc. Allerton Conf. Communications, Control Computing
, pp. 1806-1813
-
-
Teixeira, A.1
Shames, I.2
Sandberg, H.3
Johansson, K.H.4
-
15
-
-
84890076504
-
On analysis and design of stealthresilient control systems
-
San Francisco, CA, Aug.
-
S. D. Bopardikar and A. Speranzon, "On analysis and design of stealthresilient control systems," in Proc. Int. Symp. Resilient Control Systems, San Francisco, CA, Aug. 2013, pp. 48-53
-
(2013)
Proc. Int. Symp. Resilient Control Systems
, pp. 48-53
-
-
Bopardikar, S.D.1
Speranzon, A.2
-
16
-
-
84897707918
-
Monitoring of stealthy attack in networked control systems
-
Nice, France, Oct.
-
J. Y. Keller and D. Sauter, "Monitoring of stealthy attack in networked control systems," in Proc. Conf. Control Fault-Tolerant Systems, Nice, France, Oct. 2013, pp. 462-467
-
(2013)
Proc. Conf. Control Fault-Tolerant Systems
, pp. 462-467
-
-
Keller, J.Y.1
Sauter, D.2
-
17
-
-
77949601382
-
Secure control against replay attacks
-
Monticello, IL sept.
-
Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Proc. Allerton Conf. Communications, Control Computing, Monticello, IL, Sept. 2010, pp. 911-918
-
(2010)
Proc. Allerton Conf. Communications, Control Computing
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
18
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo, T.-H. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, 2012
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.-H.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
19
-
-
84866745498
-
A decoupled feedback structure for covertly appropriating network control systems
-
Milan, Italy aug.
-
R. Smith, "A decoupled feedback structure for covertly appropriating network control systems," in Proc. Int. Federation Automatic Control World Congr., Milan, Italy, Aug. 2011, pp. 90-95
-
(2011)
Proc. Int. Federation Automatic Control World Congr
, pp. 90-95
-
-
Smith, R.1
-
20
-
-
80053166327
-
Stackelberg-game analysis of correlated attacks in cyber-physical systems
-
San Francisco, CA, July
-
M. Zhu and S. Martínez, "Stackelberg-game analysis of correlated attacks in cyber-physical systems," in Proc. American Control Conf., San Francisco, CA, July 2011, pp. 4063-4068
-
(2011)
Proc. American Control Conf
, pp. 4063-4068
-
-
Zhu, M.1
Martínez, S.2
-
21
-
-
84901474949
-
Secure estimation and control for cyber-physical systems under adversarial attacks
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure estimation and control for cyber-physical systems under adversarial attacks," IEEE Trans. Autom. Contr., vol. 59, no. 6, pp. 1454-1467, 2014
-
(2014)
IEEE Trans. Autom. Contr.
, vol.59
, Issue.6
, pp. 1454-1467
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
22
-
-
0030369168
-
The potential for malicious control in a competitive power systems environment
-
Dearborn, MI
-
C. L. De Marco, J. V. Sariashkar, and F. Alvarado, "The potential for malicious control in a competitive power systems environment," in Proc. IEEE Int. Conf. Control Applications, Dearborn, MI, 1996, pp. 462-467
-
(1996)
Proc. IEEE Int. Conf. Control Applications
, pp. 462-467
-
-
De Marco, C.L.1
Sariashkar, J.V.2
Alvarado, F.3
-
23
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
Gaithersburg, MD oct.
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE Int. Conf. Smart Grid Communications, Gaithersburg, MD, Oct. 2010, pp. 214-219
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Communications
, pp. 214-219
-
-
Dan, G.1
Sandberg, H.2
-
24
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Orlando, FL, Dec.
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," in Proc. IEEE Conf. Decision Control European Control Conf., Orlando, FL, Dec. 2011, pp. 2195-2201
-
(2011)
Proc. IEEE Conf. Decision Control European Control Conf
, pp. 2195-2201
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
25
-
-
82155185205
-
Distributed internet-based load altering attacks against smart power grids
-
A.-H. Mohsenian-Rad and A. Leon-Garcia, "Distributed internet-based load altering attacks against smart power grids," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 667-674, 2011
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 667-674
-
-
Mohsenian-Rad, A.-H.1
Leon-Garcia, A.2
-
26
-
-
84874173102
-
Cyber-physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid," Proc. IEEE, vol. 99, no. 1, pp. 1-15, 2012
-
(2012)
Proc. IEEE
, vol.99
, Issue.1
, pp. 1-15
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
27
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
Brussels, Belgium
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks: Characterizations and countermeasures," in Proc. IEEE Int. Conf. Smart Grid Communications, Brussels, Belgium, 2011, pp. 232-237
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Communications
, pp. 232-237
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
28
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
S. Sundaram and C. Hadjicostis, "Distributed function calculation via linear iterative strategies in the presence of malicious agents," IEEE Trans. Autom. Contr., vol. 56, no. 7, pp. 1495-1508, 2011
-
(2011)
IEEE Trans. Autom. Contr.
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.2
-
29
-
-
84855392746
-
Consensus computation in unreliable networks: A system theoretic approach
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Consensus computation in unreliable networks: A system theoretic approach," IEEE Trans. Autom. Contr., vol. 57, no. 1, pp. 90-104, 2012
-
(2012)
IEEE Trans. Autom. Contr.
, vol.57
, Issue.1
, pp. 90-104
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
30
-
-
84855384074
-
On distributed convex optimization under inequality and equality constraints
-
M. Zhu and S. Martínez, "On distributed convex optimization under inequality and equality constraints," IEEE Trans. Autom. Contr., vol. 57, no. 1, pp. 151-164, 2012
-
(2012)
IEEE Trans. Autom. Contr.
, vol.57
, Issue.1
, pp. 151-164
-
-
Zhu, M.1
Martínez, S.2
-
31
-
-
77953044026
-
Stealthy deception attacks on water SCADA systems
-
Stockholm, Sweden, Apr
-
S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, "Stealthy deception attacks on water SCADA systems," in Proc. Hybrid Systems: Computation Control, Stockholm, Sweden, Apr. 2010, pp. 161-170
-
(2010)
Proc. Hybrid Systems: Computation Control
, pp. 161-170
-
-
Amin, S.1
Litrico, X.2
Sastry, S.S.3
Bayen, A.M.4
-
32
-
-
78049296486
-
A fault diagnosis and security framework for water systems
-
D. G. Eliades and M. M. Polycarpou, "A fault diagnosis and security framework for water systems," IEEE Trans. Control Syst. Technol., vol. 18, no. 6, pp. 1254-1265, 2010
-
(2010)
IEEE Trans. Control Syst. Technol.
, vol.18
, Issue.6
, pp. 1254-1265
-
-
Eliades, D.G.1
Polycarpou, M.M.2
-
34
-
-
84887278643
-
Attack detection and identification in cyber-physical systems
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Trans. Autom. Contr., vol. 58, no. 11, pp. 2715-2729, 2013
-
(2013)
IEEE Trans. Autom. Contr.
, vol.58
, Issue.11
, pp. 2715-2729
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
35
-
-
0040761805
-
Invariant subspaces and invertibility properties for singular systems: The general case
-
Apr.
-
T. Geerts, "Invariant subspaces and invertibility properties for singular systems: The general case," Linear Algebra Applicat., vol. 183, pp. 61-88, Apr. 1993
-
(1993)
Linear Algebra Applicat.
, vol.183
, pp. 61-88
-
-
Geerts, T.1
-
37
-
-
33750581485
-
-
Ph. D. dissertation, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA
-
E. Scholtz, "Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems," Ph. D. dissertation, Dept. Electr. Eng. Comput. Sci., Massachusetts Inst. Technol., Cambridge, MA, 2004
-
(2004)
Observer-based Monitors and Distributed Wave Controllers for Electromechanical Disturbances in Power Systems
-
-
Scholtz, E.1
-
41
-
-
0038516887
-
Generic properties and control of linear structured systems: A survey
-
J. M. Dion, C. Commault, and J. van der Woude, "Generic properties and control of linear structured systems: A survey," Automatica, vol. 39, no. 7, pp. 1125-1144, 2003
-
(2003)
Automatica
, vol.39
, Issue.7
, pp. 1125-1144
-
-
Dion, J.M.1
Commault, C.2
Woude Der J.Van3
-
43
-
-
84874233151
-
Cyber-physical security via geometric control: Distributed monitoring and malicious attacks
-
Maui, HI, Dec.
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical security via geometric control: Distributed monitoring and malicious attacks," in Proc. IEEE Conf. Decision Control, Maui, HI, Dec. 2012, pp. 3418-3425
-
(2012)
Proc. IEEE Conf. Decision Control
, pp. 3418-3425
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
44
-
-
84887295094
-
Continuous-time distributed observers with discrete communication
-
F. Dörfler, F. Pasqualetti, and F. Bullo, "Continuous-time distributed observers with discrete communication," IEEE J. Sel. Topics Signal Processing, vol. 7, no. 2, pp. 296-304, 2013
-
(2013)
IEEE J. Sel. Topics Signal Processing
, vol.7
, Issue.2
, pp. 296-304
-
-
Dörfler, F.1
Pasqualetti, F.2
Bullo, F.3
-
45
-
-
0026107664
-
An application of Prony methods in PSS design for multimachine systems
-
D. J. Trudnowski, J. R. Smith, T. A. Short, and D. A. Pierre, "An application of Prony methods in PSS design for multimachine systems," IEEE Trans. Power Syst., vol. 6, no. 1, pp. 118-126, 1991
-
(1991)
IEEE Trans. Power Syst.
, vol.6
, Issue.1
, pp. 118-126
-
-
Trudnowski, D.J.1
Smith, J.R.2
Short, T.A.3
Pierre, D.A.4
-
47
-
-
80053157963
-
A graph-theoretical characterization of power network vulnerabilities
-
San Francisco, CA, June
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities," in Proc. American Control Conf., San Francisco, CA, June 2011, pp. 3918-3923
-
(2011)
Proc. American Control Conf
, pp. 3918-3923
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
51
-
-
60549094984
-
Optimization models for operative planning in drinking water networks
-
J. Burgschweiger, B. Gnädig, and M. C. Steinbach, "Optimization models for operative planning in drinking water networks," Optim. Eng., vol. 10, no. 1, pp. 43-73, 2009
-
(2009)
Optim. Eng.
, vol.10
, Issue.1
, pp. 43-73
-
-
Burgschweiger, J.1
Gnädig, B.2
Steinbach, M.C.3
-
53
-
-
84921468284
-
-
U. S. Environ. Protection Agency, Water Supply and Water Resources Div., Tech. Rep.
-
L. A. Rossman, "EPANET 2, water distribution system modeling software," U. S. Environ. Protection Agency, Water Supply and Water Resources Div., Tech. Rep., 2000
-
(2000)
EPANET 2, Water Distribution System Modeling Software
-
-
Rossman, L.A.1
-
56
-
-
0026679548
-
A tutorial on the geometric analysis of linear time-invariant implicit systems
-
F. L. Lewis, "A tutorial on the geometric analysis of linear time-invariant implicit systems," Automatica, vol. 28, no. 1, pp. 119-137, 1992
-
(1992)
Automatica
, vol.28
, Issue.1
, pp. 119-137
-
-
Lewis, F.L.1
|