-
3
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
D. Nicol, W. Saunders, and K. Trivedi. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 1(1):48-65, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.1
Saunders, W.2
Trivedi, K.3
-
6
-
-
77951729734
-
A survey of game theory as applied to network security
-
In, Jan
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu. A survey of game theory as applied to network security. In 2010 43rd Hawaii International Conference on System Sciences, pages 1-10, Jan. 2010.
-
(2010)
2010 43rd Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
9
-
-
1542288809
-
A game theoretic approach to decision and analysis in network intrusion detection
-
In, Dec
-
T. Alpcan and T. Basar. A game theoretic approach to decision and analysis in network intrusion detection. In 42nd IEEE Conference on Decision and Control, volume 3, pages 2595-2600, Dec. 2003.
-
(2003)
42nd IEEE Conference on Decision and Control
, vol.3
, pp. 2595-2600
-
-
Alpcan, T.1
Basar, T.2
-
12
-
-
1542359079
-
Kalman filtering with intermittent observations
-
In, dec
-
B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. Jordan, and S. Sastry. Kalman filtering with intermittent observations. In 42nd IEEE Conference on Decision and Control, volume 1, pages 701-708, dec. 2003.
-
(2003)
42nd IEEE Conference on Decision and Control
, vol.1
, pp. 701-708
-
-
Sinopoli, B.1
Schenato, L.2
Franceschetti, M.3
Poolla, K.4
Jordan, M.5
Sastry, S.6
-
13
-
-
84860656628
-
Security of interdependent and identical networked control systems
-
Submitted to
-
S. Amin, G. Schwartz, and S. Sastry. Security of interdependent and identical networked control systems. Submitted to Automatica.
-
Automatica
-
-
Amin, S.1
Schwartz, G.2
Sastry, S.3
-
14
-
-
78651420105
-
On malicious data attacks on power system state estimation
-
Sep, In
-
O. Kosut, L. Jia, R.J. Thomas, and L. Tong. On malicious data attacks on power system state estimation. In 45th International Universities Power Engineering Conference (UPEC), pages 1-6, Sep. 2010.
-
(2010)
45th International Universities Power Engineering Conference (UPEC)
, pp. 1-6
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
15
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
Dec, In
-
A. Teixeira, S. Amin, H. Sandberg, K.H. Johansson, and S. Sastry. Cyber security analysis of state estimators in electric power systems. In 49th IEEE Conference on Decision and Control, pages 5991-5998, Dec. 2010.
-
(2010)
49th IEEE Conference on Decision and Control
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.H.4
Sastry, S.5
-
18
-
-
43449134704
-
Using the kalman filtering for the fault detection and isolation (fdi) in the nonlinear dynamics processes
-
Y. Chetouani. Using the kalman filtering for the fault detection and isolation (fdi) in the nonlinear dynamics processes. International Journal of Chemical Reactor Engineering, 6(43):48-65, 2008.
-
(2008)
International Journal of Chemical Reactor Engineering
, vol.6
, Issue.43
, pp. 48-65
-
-
Chetouani, Y.1
-
19
-
-
84897691942
-
Application of kalman filters for the fault diagnoses of aircraft engine
-
In, May
-
W. Xue and Y. Guo. Application of kalman filters for the fault diagnoses of aircraft engine. In Kalman Filter, May 2010.
-
(2010)
Kalman Filter
-
-
Xue, W.1
Guo, Y.2
-
21
-
-
0017022844
-
A survey of design methods for failure detection in dynamic systems
-
Nov
-
A.S. Willsky. A survey of design methods for failure detection in dynamic systems. Automatica, 12(6):601-611, Nov. 1976.
-
(1976)
Automatica
, vol.12
, Issue.6
, pp. 601-611
-
-
Willsky, A.S.1
|