-
2
-
-
50849130209
-
Attack and fault identification in electric power control systems: An approach to improve security
-
M. Coutinho, G. Lambert-Torres, L. da Silva, J. da Silva, J. Neto, E. da Costa Bortoni and H. Lazarek, Attack and fault identification in electric power control systems: An approach to improve security, Proceedings of the Power Tech Conference, pp. 103–107, 2007.
-
(2007)
Proceedings of the Power Tech Conference
, pp. 103-107
-
-
Coutinho, M.1
Lambert-Torres, G.2
Da Silva, L.3
Da Silva, J.4
Neto, J.5
Da Costa Bortoni, E.6
Lazarek, H.7
-
4
-
-
35148864072
-
Performance analysis of probabilistic packet marking in IPv6
-
X. Dang, E. Albright and A. Abonamah, Performance analysis of probabilistic packet marking in IPv6, Computer Communications, vol. 30(16), pp. 3193–3202, 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.16
, pp. 3193-3202
-
-
Dang, X.1
Albright, E.2
Abonamah, A.3
-
5
-
-
0027561446
-
A plant-wide industrial process control problem
-
J. Downs and E. Vogel, A plant-wide industrial process control problem, Computers and Chemical Engineering, vol. 17(3), pp. 245–255, 1993.
-
(1993)
Computers and Chemical Engineering
, vol.17
, Issue.3
, pp. 245-255
-
-
Downs, J.1
Vogel, E.2
-
6
-
-
84857378372
-
Safeguarding critical infrastructures
-
H. Diab and A. Zomaya, John Wiley, Hoboken, New Jersey
-
D. Gamez, S. Nadjm-Tehrani, J. Bigham, C. Balducelli, K. Burbeck and T. Chyssler, Safeguarding critical infrastructures, in Dependable Computing Systems: Paradigms, Performance Issues and Applications, H. Diab and A. Zomaya (Eds.), John Wiley, Hoboken, New Jersey, pp. 479–499, 2005.
-
(2005)
Dependable Computing Systems: Paradigms, Performance Issues and Applications
, pp. 479-499
-
-
Gamez, D.1
Nadjm-Tehrani, S.2
Bigham, J.3
Balducelli, C.4
Burbeck, K.5
Chyssler, T.6
-
7
-
-
40949111947
-
A moving horizon state estimation algorithm applied to the Tennessee Eastman benchmark process
-
T. Kraus, P. Kuhl, L. Wirsching, H. Bock and M. Diehl, A moving horizon state estimation algorithm applied to the Tennessee Eastman benchmark process, Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, pp. 377–382, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems
, pp. 377-382
-
-
Kraus, T.1
Kuhl, P.2
Wirsching, L.3
Bock, H.4
Diehl, M.5
-
8
-
-
0034351040
-
Plant-wide control – A review and a new design procedure
-
T. Larsson and S. Skogestad, Plant-wide control – A review and a new design procedure, Modeling, Identification and Control, vol. 21(4), pp. 209–240, 2000.
-
(2000)
Modeling, Identification and Control
, vol.21
, Issue.4
, pp. 209-240
-
-
Larsson, T.1
Skogestad, S.2
-
10
-
-
78651084507
-
-
Critical Infrastructure Protection IV, T. Moore and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
T. McEvoy and S. Wolthusen, Detecting sensor signal manipulations in non-linear chemical processes, in Critical Infrastructure Protection IV, T. Moore and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 81–94, 2010.
-
(2010)
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes
, pp. 81-94
-
-
McEvoy, T.1
Wolthusen, S.2
-
11
-
-
0028431355
-
Base control for the Tennessee Eastman problem
-
T. McAvoy and N. Ye, Base control for the Tennessee Eastman problem, Computers and Chemical Engineering, vol. 18(5), pp. 383–413, 1994.
-
(1994)
Computers and Chemical Engineering
, vol.18
, Issue.5
, pp. 383-413
-
-
McAvoy, T.1
Ye, N.2
-
12
-
-
0030217795
-
Decentralized control of the Tennessee Eastman challenge process
-
N. Ricker, Decentralized control of the Tennessee Eastman challenge process, Journal of Process Control, vol. 6(4), pp. 205–221, 1996.
-
(1996)
Journal of Process Control
, vol.6
, Issue.4
, pp. 205-221
-
-
Ricker, N.1
-
14
-
-
84889830739
-
-
John Wiley, Hoboken, New Jersey
-
D. Simon, Optimal State Estimation: Kalman, H8 and Nonlinear Approaches, John Wiley, Hoboken, New Jersey, 2006.
-
(2006)
Optimal State Estimation: Kalman, H8 and Nonlinear Approaches
-
-
Simon, D.1
-
15
-
-
47149112288
-
Context information-based cyber security defense of protection system
-
S. Su, X. Duan, X. Zeng, W. Chan and K. Li, Context information-based cyber security defense of protection system, IEEE Transactions on Power Delivery, vol. 22(3), pp. 1477–1481, 2007.
-
(2007)
IEEE Transactions on Power Delivery
, vol.22
, Issue.3
, pp. 1477-1481
-
-
Su, S.1
Duan, X.2
Zeng, X.3
Chan, W.4
Li, K.5
-
16
-
-
84856339254
-
-
Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany
-
N. Svendsen and S. Wolthusen, Using physical models for anomaly detection in control systems, in Critical Infrastructure Protection III, C. Palmer and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 139–149, 2009.
-
(2009)
Using Physical Models for Anomaly Detection in Control Systems
, pp. 139-149
-
-
Svendsen, N.1
Wolthusen, S.2
-
17
-
-
77953695984
-
Cybersecurity for critical infrastructures: Attack and defense modeling
-
C. Ten, G. Manimaran and C. Liu, Cybersecurity for critical infrastructures: Attack and defense modeling, IEEE Transactions on Systems, Man and Cybernetics (Part A: Systems and Humans), vol. 40(4), pp. 853–865, 2010.
-
(2010)
IEEE Transactions on Systems, Man and Cybernetics (Part A: Systems and Humans)
, vol.40
, Issue.4
, pp. 853-865
-
-
Ten, C.1
Manimaran, G.2
Liu, C.3
|