1 |
H.L. Gawand, A.K. Bhattacharjee, K. Roy, Confirmation of Theoretical Results Regarding Control Theoretic Cyber Attacks on Controllers, Dynamics and Control of Process Systems - IFAC, DYCOPS 10 (1) (2013) 702-707.
|
2 |
A.A. Cardenas, S. Amin, Z.S. Liny, Y.-L. Huangy, C.-Y. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection, and response, in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security USA, Published by ACM 2011 Article, New York, NY, USA, 355-366.
|
3 |
M. Basseville, Detecting changes in signals and systems - a survey, Automatica 24 (1988) 309-326.
DOI
|
4 |
I. Sharfman, A. Schuster, D. Keren, A geometric approach to monitoring threshold functions over distributed data streams, SIGMOD '13, ACM New York, NY, USA.
|
5 |
M. Basseville, Statistical method of change detection, in: H. Unbehauen (Ed.), Robotics and Automation XVI, EOLSS Publishers, Oxford, UK, 2002, pp. 130-145.
|
6 |
F. Pasqualetti, Secure Control Systems: A Control-theoretic Approach to Cyber-Physical Security, PhD thesis, University Of California, USA, 2012.
|
7 |
Y. Liu, P. Ning, M. Reiter, Generalized false data injection attacks against state estimation in electric power grids, ACM Trans. Inform. Syst. Sec. (TISSEC) 14 13 (2011) 1-13:32.
|
8 |
R.K. Shyamasundar, Security and protection of SCADA: a big data algorithmic approach, in: Proceedings of the 6th International Conference on Security of Information and Networks (SIN '13), ACM, New York, NY, USA, 2013, pp. 20-27.
|
9 |
V. Shapiro, Real functions for representation of rigid solids, Computer-Aided Geom. Des. 11 (1994) 153-175.
DOI
|
10 |
G.T. Toussaint, A simple linear algorithm for intersecting convex polygons, Vis. Comput. 1 (1985) 118-123.
DOI
|
11 |
E.P. Gatzke, E.S. Meadows, C. Wang, F.J. Doyle III, Model based control of a four-tank system, Comput. Chem. Eng. 24 (2000) 1503-1509.
DOI
|
12 |
F.P. Preparata, S.J. Hong, Convex hulls of finite sets of points in two and three dimensions, Commun. ACM 20 (1977) 87-93.
DOI
|
13 |
K. Ogata, Modern Control Engineering, fifth ed., Prentice Hall, Boston, 2010.
|
14 |
M. Caselli, E. Zambon, F. Kargl, Sequence-aware intrusion detection in industrial control systems, in: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, ACM, New York, NY, USA, 2015, pp. 13-24.
|
15 |
H.L. Gawand, A.K. Bhattacharjee, K. Roy, Investigation of control theoretic cyber-attacks on controllers, Int. J. Syst. Control Commun. 7 (2016), http://dx.doi.org/10.1504/IJSCC.2016.077410.
DOI
|