A secure control framework for resource-limited adversaries
Top Cited Papers
- 1 January 2015
- journal article
- research article
- Published by Elsevier BV in Automatica
- Vol. 51, 135-148
- https://doi.org/10.1016/j.automatica.2014.10.067
Abstract
No abstract availableKeywords
Funding Information
- European Union Seventh Framework Programme (608224)
- Swedish Research Council (2009-4565, 2013-5523)
- Knut and Alice Wallenberg Foundation
This publication has 27 references indexed in Scilit:
- A control-theoretic approach to disseminating values and overcoming malicious links in wireless networksAutomatica, 2012
- Integrity attacks on cyber-physical systemsPublished by Association for Computing Machinery (ACM) ,2012
- Cyber War Will Not Take PlaceJournal of Strategic Studies, 2012
- A Decoupled Feedback Structure for Covertly Appropriating Networked Control SystemsIFAC Proceedings Volumes, 2011
- A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator*IFAC Proceedings Volumes, 2011
- Cyber attack in a two-area power system: Impact identification using reachabilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systemsIEEE Transactions on Automatic Control, 2002
- Stability of networked control systemsIEEE Control Systems, 2001
- The quadruple-tank process: a multivariable laboratory process with an adjustable zeroIEEE Transactions on Control Systems Technology, 2000
- Survey of robust residual generation and evaluation methods in observer-based fault detection systemsJournal of Process Control, 1997