类 型
11 篇文献
 
a robust reachability review for control system security  
Control systems underpin the core technology in numerous critical infrastructure systems; e.g. the electricity, transportation and many defence systems. Increasingly, such systems are becoming the tar......
Australian Control Conference  2011
0次引用 0 0
Integrity attacks on cyber-physical systems  
In this paper we consider the integrity attack on Cyber-Physical System(CPS), which is modeled as a discrete linear time-invariant system equipped with a Kalman filter, LQG controller andΧ2failure det......
Information Processing in Sensor Networks  2012
0次引用 0 0
Analysis and Design Tools for Structured Feedback Systems  
As we begin to analyze and construct extremely complex systems, a theory for understanding and designing the underlying architecture becomes very important. To move in the direction of a precise theor......
0次引用 0 0
on resilient consensus against replay attacks in operator-vehicle networks  
We consider an operator-vehicle network where each unmanned vehicle is remotely maneuvered by an operator and its inputs are limited. The objective of the operator-vehicle network is to steer the vehi......
American Control Conference  2012
0次引用 0 0
Resilient Asymptotic Consensus in Asynchronous Robust Networks  
Abstract — In this paper, we study the problem of reaching consensus asymptotically in the presence of adversary nodes whenever the network is asynchronous under a local broadcast model of communicati......
0次引用 0 0
Attack-resilient distributed formation control via online adaptation  
This paper investigates a distributed formation control problem in an operator-vehicle network where each vehicle is remotely controlled by an operator. Each operator-vehicle pair is attacked by an ad......
Conference on Decision and Control  2011
0次引用 0 0
On false-data attacks in robust multi-sensor-based estimation  
State estimation in critical networked infrastructure such as the transportation and electricity (smart grid) networks is becoming increasingly important. Consequently, the security of state estimatio......
International Conference on Control and Automation  2011
0次引用 0 0
vulnerable links and secure architectures in the stabilization of networks of controlled dynamical systems  
This work considers destabilization attacks acting on a single link in a system's logical interconnection structure. This structure, or signal architecture, is characterized by the causal relationship......
American Control Conference  2012
0次引用 0 0
Analysis and Design of Complex Network Environments  
Abstract: This research takes a fresh view of complex network environments and answers fundamental questions about 1) how to model them, 2) the design of experiments necessary to discover their struct......
0次引用 0 0
False Data Injection Attacks with Incomplete Information  
False data injection attacks have recently been introduced as an important class of cyber attacks against smart grid's wide area measurement and monitoring systems. These attacks aim to compromise the......
0次引用 0 0

1/2 第一页 上一页 1 2 下一页
Feedback
Feedback
Feedback
我想反馈:
排行榜