-
2
-
-
84155167232
-
Cyber-physical security of a smart grid infrastructure
-
Y. Mo, T. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, "Cyber-physical security of a smart grid infrastructure," Proc. IEEE, vol. 100, no. 1, pp. 195-209, 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 195-209
-
-
Mo, Y.1
Kim, T.2
Brancik, K.3
Dickinson, D.4
Lee, H.5
Perrig, A.6
Sinopoli, B.7
-
3
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Proc. 28th Int. Conf. Distrib. Comp. Syst. Workshops, 2008, pp. 495-500.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comp. Syst. Workshops
, pp. 495-500
-
-
Cardenas, A.1
Amin, S.2
Sastry, S.3
-
4
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
S. Amin, A. Cardenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," Hybrid Syst. : Computat. Control, pp. 31-45, 2009.
-
(2009)
Hybrid Syst. : Computat. Control
, pp. 31-45
-
-
Amin, S.1
Cardenas, A.2
Sastry, S.3
-
5
-
-
84855700411
-
Launching denial-of-service jamming attacks in underwater sensor networks
-
M. Zuba, Z. Shi, Z. Peng, and J. Cui, "Launching denial-of-service jamming attacks in underwater sensor networks," in Proc. 6th ACM Int. Workshop Underwater Netw. , 2011, p. 12.
-
(2011)
Proc. 6th ACM Int. Workshop Underwater Netw
, pp. 12
-
-
Zuba, M.1
Shi, Z.2
Peng, Z.3
Cui, J.4
-
6
-
-
31544436627
-
Denial-of-service attackdetection techniques
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-service attackdetection techniques," IEEE Internet Comput. , vol. 10, no. 1, pp. 82-89, 2006.
-
(2006)
IEEE Internet Comput.
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
8
-
-
0004071782
-
-
Philadelphia, PA, USA: SIAM
-
T. Basar and G. J. Olsder, Dynamic Noncooperative Game Theory, vol. 200. Philadelphia, PA, USA: SIAM, 1995.
-
(1995)
Dynamic Noncooperative Game Theory
, vol.200
-
-
Basar, T.1
Olsder, G.J.2
-
9
-
-
77957771173
-
Game-theoretic analysis of an aerial jamming attack on a uav communication network
-
S. Bhattacharya and T. Basar, "Game-theoretic analysis of an aerial jamming attack on a uav communication network," in Proc. IEEE Amer. Control Conf. (ACC10), 2010, pp. 818-823.
-
(2010)
Proc. IEEE Amer. Control Conf. (ACC10)
, pp. 818-823
-
-
Bhattacharya, S.1
Basar, T.2
-
10
-
-
77951729734
-
A survey of game theory as applied to network security
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, "A survey of game theory as applied to network security," in Proc. IEEE 43rd Hawaii Int. Conf. Syst. Sci. (HICSS), 2010, pp. 1-10.
-
(2010)
Proc. IEEE 43rd Hawaii Int. Conf. Syst. Sci. (HICSS)
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
11
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO gaussian fading channels," IEEE Trans. Inform. Theory, vol. 50, no. 9, pp. 2119-2123, 2004.
-
(2004)
IEEE Trans. Inform. Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Basar, T.2
Srikant, R.3
-
12
-
-
79953130034
-
Optimal control in the presence of an intelligent jammer with limited actions
-
A. Gupta, C. Langbort, and T. Basar, "Optimal control in the presence of an intelligent jammer with limited actions," in Proc. 49th IEEE Conf. Decision Control (CDC), 2010, pp. 1096-1101.
-
(2010)
Proc. 49th IEEE Conf. Decision Control (CDC)
, pp. 1096-1101
-
-
Gupta, A.1
Langbort, C.2
Basar, T.3
-
13
-
-
2442604387
-
A game theory based approach for security in wireless sensor networks
-
A. Agah, S. Das, and K. Basu, "A game theory based approach for security in wireless sensor networks," in Proc. IEEE Int. Conf. Perform. , Comp. , Commun. , 2004, pp. 259-263.
-
(2004)
Proc. IEEE Int. Conf. Perform., Comp. , Commun
, pp. 259-263
-
-
Agah, A.1
Das, S.2
Basu, K.3
-
14
-
-
79957810078
-
A denial-of-service jamming game for remote state monitoring in smart grid
-
H. Li, L. Lai, and R. C. Qiu, "A denial-of-service jamming game for remote state monitoring in smart grid," in Proc. IEEE 45th Annu. Conf. Inform. Sci. Syst. (CISS), 2011, pp. 1-6.
-
(2011)
Proc. IEEE 45th Annu. Conf. Inform. Sci. Syst. (CISS)
, pp. 1-6
-
-
Li, H.1
Lai, L.2
Qiu, R.C.3
-
15
-
-
84893916341
-
Jamming attack on cyber-physical systems: A game-theoretic approach
-
Y. Li, L. Shi, P. Cheng, J. Chen, and D. E. Quevedo, "Jamming attack on cyber-physical systems: A game-theoretic approach," in Proc. IEEE 3rd Annu. Int. Conf. Cyber Technol. Autom. Control Intell. Syst. (CYBER), 2013, pp. 252-257.
-
(2013)
Proc. IEEE 3rd Annu. Int. Conf. Cyber Technol. Autom. Control Intell. Syst. (CYBER)
, pp. 252-257
-
-
Li, Y.1
Shi, L.2
Cheng, P.3
Chen, J.4
Quevedo, D.E.5
-
16
-
-
62749204467
-
Sensor scheduling using smart sensors
-
P. Hovareshti, V. Gupta, and J. Baras, "Sensor scheduling using smart sensors," in Proc. 46th IEEE Conf. Decision Control, 2007, pp. 494-499.
-
(2007)
Proc. 46th IEEE Conf. Decision Control
, pp. 494-499
-
-
Hovareshti, P.1
Gupta, V.2
Baras, J.3
-
17
-
-
77949422929
-
Kalman filtering over a packetdropping network: A probabilistic perspective
-
Mar
-
L. Shi, M. Epstein, and R. Murray, "Kalman filtering over a packetdropping network: A probabilistic perspective," IEEE Trans. Autom. Control, vol. 55, no. 3, pp. 594-604, Mar. 2010.
-
(2010)
IEEE Trans. Autom. Control
, vol.55
, Issue.3
, pp. 594-604
-
-
Shi, L.1
Epstein, M.2
Murray, R.3
-
19
-
-
84859978401
-
Optimal sensor power scheduling for state estimation of Gauss-Markov systems over a packet-dropping network
-
L. Shi and L. Xie, "Optimal sensor power scheduling for state estimation of Gauss-Markov systems over a packet-dropping network," IEEE Trans. Signal Process. , vol. 60, no. 5, pp. 2701-2705, 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.5
, pp. 2701-2705
-
-
Shi, L.1
Xie, L.2
-
20
-
-
4644285836
-
Kalman filtering with intermittent observations
-
B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. Jordan, and S. Sastry, "Kalman filtering with intermittent observations," IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1453-1464, 2004.
-
(2004)
IEEE Trans. Autom. Control
, vol.49
, Issue.9
, pp. 1453-1464
-
-
Sinopoli, B.1
Schenato, L.2
Franceschetti, M.3
Poolla, K.4
Jordan, M.5
Sastry, S.6
-
21
-
-
79960919898
-
Sensor data scheduling for optimal state estimation with communication energy constraint
-
L. Shi, P. Cheng, and J. Chen, "Sensor data scheduling for optimal state estimation with communication energy constraint," Automatica, vol. 47, no. 8, pp. 1693-1698, 2011.
-
(2011)
Automatica
, vol.47
, Issue.8
, pp. 1693-1698
-
-
Shi, L.1
Cheng, P.2
Chen, J.3
-
22
-
-
0004198442
-
-
Hemel Hempstead, U. K.: Harvester Wheatsheaf
-
R. Gibbons, A Primer in Game Theory. Hemel Hempstead, U. K. : Harvester Wheatsheaf, 1992.
-
(1992)
A Primer in Game Theory
-
-
Gibbons, R.1
-
23
-
-
0001730497
-
Non-cooperative games
-
J. Nash, "Non-cooperative games," Annals Math. , vol. 54, no. 2, pp. 286-295, 1951.
-
(1951)
Annals Math.
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.1
-
25
-
-
0024984013
-
A network security monitor
-
L. Heberlein, G. Dias, K. Levitt, B. Mukherjee, J. Wood, and D. Wolber, "A network security monitor," in Proc. IEEE Comp. Soc. Symp. Res. Security Privacy, 1990, pp. 296-304.
-
(1990)
Proc. IEEE Comp. Soc. Symp. Res. Security Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
26
-
-
0013414824
-
-
New York, NY, USA: Springer-Verlag
-
P. Bremaud, Markov Chains. New York, NY, USA: Springer-Verlag, 1999.
-
(1999)
Markov Chains
-
-
Bremaud, P.1
|