참고문헌
- A.A. Cardenas, S. Amin, Z.S. Liny, Y.-L. Huangy, C.-Y. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection, and response, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security USA, Published by ACM 2011 Article, New York, NY, USA, 355-366.
- M. Basseville, Detecting changes in signals and systems - a survey, Automatica 24 (1988) 309-326. https://doi.org/10.1016/0005-1098(88)90073-8
- H.L. Gawand, A.K. Bhattacharjee, K. Roy, Confirmation of Theoretical Results Regarding Control Theoretic Cyber Attacks on Controllers, Dynamics and Control of Process Systems - IFAC, DYCOPS 10 (1) (2013) 702-707.
- I. Sharfman, A. Schuster, D. Keren, A geometric approach to monitoring threshold functions over distributed data streams, SIGMOD '13, ACM New York, NY, USA.
- M. Basseville, Statistical method of change detection, in: H. Unbehauen (Ed.), Robotics and Automation XVI, EOLSS Publishers, Oxford, UK, 2002, pp. 130-145.
- F. Pasqualetti, Secure Control Systems: A Control-theoretic Approach to Cyber-Physical Security, PhD thesis, University Of California, USA, 2012.
- Y. Liu, P. Ning, M. Reiter, Generalized false data injection attacks against state estimation in electric power grids, ACM Trans. Inform. Syst. Sec. (TISSEC) 14 13 (2011) 1-13:32.
- R.K. Shyamasundar, Security and protection of SCADA: a big data algorithmic approach, in: Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13), ACM, New York, NY, USA, 2013, pp. 20-27.
- V. Shapiro, Real functions for representation of rigid solids, Computer-Aided Geom. Des. 11 (1994) 153-175. https://doi.org/10.1016/0167-8396(94)90030-2
- G.T. Toussaint, A simple linear algorithm for intersecting convex polygons, Vis. Comput. 1 (1985) 118-123. https://doi.org/10.1007/BF01898355
- E.P. Gatzke, E.S. Meadows, C. Wang, F.J. Doyle III, Model based control of a four-tank system, Comput. Chem. Eng. 24 (2000) 1503-1509. https://doi.org/10.1016/S0098-1354(00)00555-X
- F.P. Preparata, S.J. Hong, Convex hulls of finite sets of points in two and three dimensions, Commun. ACM 20 (1977) 87-93. https://doi.org/10.1145/359423.359430
- K. Ogata, Modern Control Engineering, fifth ed., Prentice Hall, Boston, 2010.
- M. Caselli, E. Zambon, F. Kargl, Sequence-aware intrusion detection in industrial control systems, in: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, ACM, New York, NY, USA, 2015, pp. 13-24.
- H.L. Gawand, A.K. Bhattacharjee, K. Roy, Investigation of control theoretic cyber-attacks on controllers, Int. J. Syst. Control Commun. 7 (2016), http://dx.doi.org/10.1504/IJSCC.2016.077410.
피인용 문헌
- Cyber Physical System (CPS)-Based Industry 4.0: A Survey vol.2, pp.3, 2017, https://doi.org/10.1142/s2424862217500142
- A Robust Cybersecurity Solution Platform Architecture for Digital Instrumentation and Control Systems in Nuclear Power Facilities vol.206, pp.7, 2017, https://doi.org/10.1080/00295450.2019.1666599
- Security risks in cyber physical systems-A systematic mapping study vol.33, pp.9, 2017, https://doi.org/10.1002/smr.2346