Attack models and scenarios for networked control systems
- 17 April 2012
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Optimal power flow: Closing the loop over corrupted dataPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012
- Cyber-physical attacks in power networks: Models, fundamental limitations and monitor designPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- A Decoupled Feedback Structure for Covertly Appropriating Networked Control SystemsIFAC Proceedings Volumes, 2011
- Optimal control in the presence of an intelligent jammer with limited actionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and CountermeasuresPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- False data injection attacks against state estimation in electric power gridsPublished by Association for Computing Machinery (ACM) ,2009
- A Survey of Fault Detection, Isolation, and Reconfiguration MethodsIEEE Transactions on Control Systems Technology, 2009
- The VIKING project: An initiative on resilient control of power networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Safe and Secure Networked Control Systems under Denial-of-Service AttacksLecture Notes in Computer Science, 2009
- The quadruple-tank process: a multivariable laboratory process with an adjustable zeroIEEE Transactions on Control Systems Technology, 2000