-
1
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Oct.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Oct. 2010, pp. 220-225.
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
2
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " ACM Trans. Inf. Syst. Secur., vol. 14, no. 1, p. 13, 2011.
-
(2011)
ACM Trans. Inf. Syst. Secur.
, vol.14
, Issue.1
, pp. 13
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
3
-
-
85086949945
-
Cyber security analysis for state estimators in air traffic control systems
-
Aug.
-
W. Liu, C. Kwon, I. Aljanabi, and I. Hwang, "Cyber security analysis for state estimators in air traffic control systems, " in Proc. AIAA Conf. Guid., Navigat., Control, Aug. 2012.
-
(2012)
Proc. AIAA Conf. Guid., Navigat., Control
-
-
Liu, W.1
Kwon, C.2
Aljanabi, I.3
Hwang, I.4
-
4
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
May
-
R. Langner, "Stuxnet: Dissecting a cyberwarfare weapon, " IEEE Security Privacy, vol. 9, no. 3, pp. 49-51, May 2011.
-
(2011)
IEEE Security Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
6
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Dec.
-
F. Pasqualetti, F. Dörfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design, " in Proc. IEEE Conf. Decision Control Eur. Control Conf. (CDC-ECC), Dec. 2011, pp. 2195-2201.
-
(2011)
Proc. IEEE Conf. Decision Control Eur. Control Conf. (CDC-ECC)
, pp. 2195-2201
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
7
-
-
84856082215
-
Secure state-estimation for dynamical systems under active adversaries
-
Sep.
-
H. Fawzi, P. Tabuada, and S. Diggavi, "Secure state-estimation for dynamical systems under active adversaries, " in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput, (Allerton). Sep. 2011, pp. 337-344.
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comput, (Allerton)
, pp. 337-344
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
8
-
-
84901474949
-
-
Jun.
-
H. Fawzi, P. Tabuada, S. Diggavi, "Secure estimation and control for cyber-physical systems under adversarial attacks, " vol. 59, no. 6, pp. 1454-1467, Jun. 2014.
-
(2014)
Secure estimation and control for cyber-physical systems under adversarial attacks
, vol.59
, Issue.6
, pp. 1454-1467
-
-
Fawzi, H.1
Tabuada, P.2
Diggavi, S.3
-
10
-
-
84871700367
-
A point-based mdp for robust single-lane autonomous driving behavior under uncertainties
-
May
-
J. Wei, J. M. Dolan, J. M. Snider, and B. Litkouhi, "A point-based mdp for robust single-lane autonomous driving behavior under uncertainties, " in Proc. IEEE Int. Conf. Robot. Autom. (ICRA), May 2011, pp. 2586-2592.
-
(2011)
Proc. IEEE Int. Conf. Robot. Autom. (ICRA)
, pp. 2586-2592
-
-
Wei, J.1
Dolan, J.M.2
Snider, J.M.3
Litkouhi, B.4
-
11
-
-
79952365911
-
Framework of WSN based human centric cyber physical in-pipe water monitoring system
-
Dec.
-
A. Nasir, B.-H. Soong, and S. Ramachandran, "Framework of wsn based human centric cyber physical in-pipe water monitoring system, " in Proc. 11st Int. Conf. Control Autom. Robot. Vis. (ICARCV), Dec. 2010, pp. 1257-1261.
-
(2010)
Proc. 11st Int. Conf. Control Autom. Robot. Vis. (ICARCV)
, pp. 1257-1261
-
-
Nasir, A.1
Soong, B.-H.2
Ramachandran, S.3
-
12
-
-
84886315913
-
Linearly solvable optimal control
-
Hoboken, NJ, USA:Wiley
-
K. Dvijotham and E. Todorov, "Linearly solvable optimal control, " Reinforcement Learning and Approximate Dynamic Programming for Feedback Control, vol. 17. Hoboken, NJ, USA: Wiley, 2013, pp. 119-141.
-
(2013)
Reinforcement Learning and Approximate Dynamic Programming for Feedback Control
, vol.17
, pp. 119-141
-
-
Dvijotham, K.1
Todorov, E.2
-
13
-
-
79953146274
-
Detection of impulsive effects in switched daes with applications to power electronics reliability analysis
-
Dec.
-
A. D. Domínguez-Garciá and S. Trenn, "Detection of impulsive effects in switched daes with applications to power electronics reliability analysis, " in Proc. 49th IEEE Conf. Decision Control (CDC), Dec. 2010, pp. 5662-5667.
-
(2010)
Proc. 49th IEEE Conf. Decision Control (CDC)
, pp. 5662-5667
-
-
Domínguez-Garciá, A.D.1
Trenn, S.2
-
14
-
-
80053157963
-
A graph-theoretical characterization of power network vulnerabilities
-
Jun.
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "A graph-theoretical characterization of power network vulnerabilities, " in Proc. Amer. Control Conf. (ACC), Jun. 2011, pp. 3918-3923.
-
(2011)
Proc. Amer. Control Conf. (ACC)
, pp. 3918-3923
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
15
-
-
77957775842
-
Networked control systems under CYBER attacks with applications to power networks
-
Jun.
-
A. Teixeira, H. Sandberg, and K. H. Johansson, "Networked control systems under CYBER attacks with applications to power networks, " in Proc. Amer. Control Conf. (ACC). Jun. 2010, pp. 3690-3696.
-
(2010)
Proc. Amer. Control Conf. (ACC)
, pp. 3690-3696
-
-
Teixeira, A.1
Sandberg, H.2
Johansson, K.H.3
-
16
-
-
84887278643
-
Attack detection and identification in cyber-physical systems
-
Nov.
-
F. Pasqualetti, F. Dorfler, and F. Bullo, "Attack detection and identification in cyber-physical systems, " IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715-2729, Nov. 2013.
-
(2013)
IEEE Trans. Autom. Control
, vol.58
, Issue.11
, pp. 2715-2729
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
17
-
-
84940901504
-
Security in stochastic control systems: Fundamental limitations and performance bounds
-
Jul.
-
C.-Z. Bai, F. Pasqualetti, and V. Gupta, "Security in stochastic control systems: Fundamental limitations and performance bounds, " in Proc. Amer. Control Conf. (ACC), Jul. 2015, pp. 195-200.
-
(2015)
Proc. Amer. Control Conf. (ACC)
, pp. 195-200
-
-
Bai, C.-Z.1
Pasqualetti, F.2
Gupta, V.3
-
18
-
-
84890526507
-
Optimal distributed detection in the presence of byzantines
-
May
-
B. Kailkhura, S. Brahma, Y. S. Han, and P. K. Varshney, "Optimal distributed detection in the presence of byzantines, " in Proc. IEEE Int. Conf. Acoust., Speech Signal Process., May 2013, pp. 2925-2929.
-
(2013)
Proc. IEEE Int. Conf. Acoust., Speech Signal Process.
, pp. 2925-2929
-
-
Kailkhura, B.1
Brahma, S.2
Han, Y.S.3
Varshney, P.K.4
-
19
-
-
84862913450
-
Further results on noise-enhanced distributed inference in the presence of Byzantines
-
Sep.
-
M. Gagrani et al., "Further results on noise-enhanced distributed inference in the presence of Byzantines, " in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton), Sep. 2011, pp. 1222-1229.
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comput. (Allerton)
, pp. 1222-1229
-
-
Gagrani, M.1
-
20
-
-
84857258999
-
The frogboiling attack: Limitations of anomaly detection for secure network coordinate systems
-
E. Chan-Tin, D. Feldman, N. Hopper, and Y. Kim, "The frogboiling attack: Limitations of anomaly detection for secure network coordinate systems, " in Proc. Secur. Privacy Commun. Netw., 2009, pp. 448-458.
-
(2009)
Proc. Secur. Privacy Commun. Netw.
, pp. 448-458
-
-
Chan-Tin, E.1
Feldman, D.2
Hopper, N.3
Kim, Y.4
-
21
-
-
84871942674
-
Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks
-
Sep.
-
Z. Wang, A. Serwadda, K. S. Balagani, and V. V. Phoha, "Transforming animals in a cyber-behavioral biometric menagerie with frog-boiling attacks, " in Proc. IEEE 5th Int. Conf. Biometrics, Theory, Appl. Syst. (BTAS), Sep. 2012, pp. 289-296.
-
(2012)
Proc. IEEE 5th Int. Conf. Biometrics, Theory, Appl. Syst. (BTAS)
, pp. 289-296
-
-
Wang, Z.1
Serwadda, A.2
Balagani, K.S.3
Phoha, V.V.4
-
23
-
-
0038650844
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
New York, NY, USA: Springer-Verlag, Oct.
-
A. Back and U. Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems, " Information Hiding. New York, NY, USA: Springer-Verlag, Oct. 2001.
-
(2001)
Information Hiding
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
24
-
-
49549085794
-
Detection of information flows
-
Nov.
-
T. He and L. Tong, "Detection of information flows, " IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 4925-4945, Nov. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 4925-4945
-
-
He, T.1
Tong, L.2
-
25
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms, " Commun. ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
26
-
-
85084161366
-
-
DTIC Document, Tech. Rep.
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The secondgeneration onion router, " DTIC Document, Tech. Rep., 2004.
-
(2004)
Tor: The Secondgeneration Onion Router
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
27
-
-
84883349409
-
Admissible length study in anonymous networking: A detection theoretic perspective
-
Sep.
-
A. Mishra and P. Venkitasubramaniam, "Admissible length study in anonymous networking: A detection theoretic perspective, " IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 1957-1969, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 1957-1969
-
-
Mishra, A.1
Venkitasubramaniam, P.2
-
28
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
May
-
X.Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems, " in Proc. IEEE Symp. Secur. Privacy (SP). May 2007, pp. 116-130.
-
(2007)
Proc. IEEE Symp. Secur. Privacy (SP)
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
29
-
-
2642544584
-
From a trickle to a flood: Active attacks on several mix types
-
New York, NY, USA: Springer-Verlag
-
A. Serjantov, R. Dingledine, and P. Syverson, "From a trickle to a flood: Active attacks on several mix types, " in Information Hiding. New York, NY, USA: Springer-Verlag, 2003.
-
(2003)
Information Hiding
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
30
-
-
84890390087
-
Anonymity of a buffer constrained chaum mix: Optimal strategy and asymptotics
-
Jul.
-
A. Mishra and P. Venkitasubramaniam, "Anonymity of a buffer constrained chaum mix: Optimal strategy and asymptotics, " in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, pp. 71-75.
-
(2013)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 71-75
-
-
Mishra, A.1
Venkitasubramaniam, P.2
-
31
-
-
84929329298
-
Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs
-
Nov.
-
P. Pradhan and P. Venkitasubramaniam, "Under the radar attacks in dynamical systems: Adversarial privacy utility tradeoffs, " in Proc. IEEE Inf. Theory Workshop, Nov. 2014. pp. 242-246.
-
(2014)
Proc. IEEE Inf. Theory Workshop
, pp. 242-246
-
-
Pradhan, P.1
Venkitasubramaniam, P.2
|