1. Konstantinou C, Maniatakos M, Saqib F et al (2015) Cyberphysical systems: a security perspective. IEEE Eur Test Symp 1- 8
2. Peng C, Zhang J (2016) Delay-distribution-dependent load frequency control of power systems with probabilistic interval delays. IEEE Trans Power Syst 31(4):3309-3317
3. Slay J, Miller M (2007) Lessons learned from the maroochy water breach. In: International conference critical infrastructure protection, Springer, US 73-82
4. Kuvshinkova S (2003) SQL slammer worm lessons learned for consideration by the electricity sector. North Am Electr Reliab Counc 1(2):5
5. Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23-40
6. Wu G, Sun J, Chen J (2016) A survey on the security of cyberphysical systems. Control Theory Technol 14(1):2-10
7. Dong P, Han Y, Guo X et al (2015) A systematic review of studies on cyber physical system security. Int J Secur Appl 9 (1):155-164
8. Amin S, Sastry S (2008) Research challenges for the security of control systems. In: USENIX association conference hot topics in security 1-6
9. O’Connell K (2008) Cia report: cyber extortionists attacked foreign power grid, disrupting delivery. Internet Business Law Services. http://www.ibls.com/internetlawnewsportalview.aspx
10. Sandberg H, Amin S, Johansson K (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Trans Control Syst 35(1):20-23
11. Teixeira A, Shames I, Sandberg H et al (2015) A secure control framework for resource-limited adversaries. Automatica 51:135- 148
12. Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC Proc 44(1):91-95
13. Teixeira A, Dán G, Sandberg H et al (2010) A cyber security study of a scada energy management system: stealthy deception attacks on the state estimator. IFAC Proc 44(1):11271-11277
14. Cárdenas AA, Amin S, Lin ZS et al (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of ACM symposium information, computer communication security 355-366
15. Mo Y, Kim TH, Brancik K et al (2012) Cyber-physical security of a smart grid infrastructure. Proc IEEE 100(1):195-209
16. Teixeira A, Pérez D, Sandberg H et al (2012) Attack models and scenarios for networked control systems. In: Proceedings of High Confidence Networked System 55-64
17. Sauter D, Li S, Aubrun C (2009) Robust fault diagnosis of networked control systems. Int J Adapt Control Signal Process 23 (8):722-736
18. Ding S (2008) Model-based fault diagnosis techniques: design schemes, algorithms, and tools, vol 49. Springer, Berlin, pp 50- 56
19. Amin S, Litrico X, Sastry SS et al (2010) Stealthy deception attacks on water SCADA systems. In: Proceedings of ACM conference hybrid system: computation and control, pp 161-170
20. Mo Y, Sinopoli B(2009) Secure control against replay attacks. In: Annual allerton conference communication, Control Computing, pp 911-918
21. Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454-1467
22. Kosut O, Jia L, Thomas RJ et al (2010) Malicious data attacks on smart grid state estimation: attack strategies and countermeasures. In: IEEE conference smart grid communications, pp 220-225
23. Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur 14(1):1-16
24. Schenato L (2009) To zero or to hold control inputs with lossy links. IEEE Trans Autom Control 54(5):1093-1099
25. Mo Y, Garone E, Casavola A et al (2010) False data injection attacks against state estimation in wireless sensor networks. In: IEEE Conference Decision Control, pp 5967-5972
26. Kwon C, Liu W, Hwang I (2013) Security analysis for cyberphysical systems against stealthy deception attacks. In: American Control Conference, pp 3344-3349
27. Gertler JJ (1988) Survey of model-based failure detection and isolation in complex plants. Cont Syst Mag 8(6):3-11
28. Manandhar K, Cao X, Hu F et al (2014) Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans Control Netw Syst 1(4):370-379
29. Kailath T, Poor HV (1998) Detection of stochastic processes. IEEE Trans Inf Theory 44(6):2230-2231
30. Wald A (1973) Sequential analysis. Courier Corporation, North Chelmsford
31. Pang ZH, Hou FY, Zhou YG et al (2015) False data injection attacks for output tracking control systems. In: Chinese Control Conference, pp 6747-6752
32. Xu Z, Ji Y, Zhou D (2009) A new real-time reliability prediction method for dynamic systems based on online fault prediction. IEEE Trans Reliab 58(3):523-538
33. Pasqualetti F, Dorfler F, Bullo F (2012) Cyber-physical security via geometric control: distributed monitoring and malicious attacks. In: Annual conference decision and control, pp 3418- 3425
34. Zhang H, Cheng P, Shi L et al (2016) Optimal dos attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 24(3):843-852
35. Zhang H, Cheng P, Shi L et al (2015) Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Autom Control 60(11):3023-3028
36. Zhang H, Cheng P, Shi L et al (2013) Optimal DoS attack policy against remote state estimation. In: IEEE annual conference decision and control, pp 5444-5449
37. Zhang H, Cheng P, Shi L et al (2014) Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American control conference, pp 3996-4001
38. Gupta A, Langbort C, Basar T (2010) Optimal control in the presence of an intelligent jammer with limited actions. In: Annual conference decision and control, pp 1096-1101
39. Zhu M, Martinez S (2011) Stackelberg-game analysis of correlated attacks in cyber-physical systems. In: American control conference, pp 4063-4068
40. Wang EK, Ye Y, Xu X et al (2010) Security issues and challenges for cyber physical system. In: Proc IEEE/ACM conference green computing communication & conference cyber, physical society computing, pp 733-738
41. Lee C, Shim H, Eun Y (2015) Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: observer-based combinatorial approach. In: European control conference, pp 1872-1877
42. Shoukry Y, Tabuada P (2016) Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans Autom Control 61 (8):2079-2091
43. Foroush H S, Martínez S(2012) On single-input controllable linear systems under periodic dos jamming attacks. arXiv preprint arXiv:1209.4101
44. Persis CD, Tesi P (2015) Input-to-state stabilizing control under denial-of-service. IEEE Trans Autom Control 60(11):2930-2944
45. Amin S, Cárdenas AA, Sastry SS (2009) Safe and secure networked control systems under denial-of service attacks. In: Hybrid systems: computation and control, Springer, pp 31-45
46. Feng Z, Hu G, Wen G (2016) Distributed consensus tracking for multi-agent systems under two types of attacks. Int J Robust Nonlinear Control 26(5):896-918
47. Yuan Y, Sun F, Zhu Q (2015) Resilient control in the presence of dos attack: switched system approach. Int J Control Autom Syst 13(6):1423-1435
48. Befekadu GK, Gupta V, Antsaklis PJ (2015) Risksensitive control under markov modulated denial-of service (DoS) attack strategies. IEEE Trans Autom Control 60(12):3299-3304
49. Pang ZH, Liu GP (2012) Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Control Syst Technol 20(55):1334-1342
50. Pasqualetti F, Dorfler F, Bullo F (2015) Controltheoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Trans Control Syst 35(1):110-127
51. Peng C, Ma SD, Xie XP (2017) Observer-based non-PDC control for networked T-S fuzzy systems with an event-triggered communication. IEEE Transactions on Cybernetics (99):1-9
52. Rieger CG, Gertman DI, McQueen MA (2009) Resilient control systems: next generation design research. In: HIS conference human system interaction, pp 632-636
53. Peng C, Li JC, Fei MR (2016) Resilient event-triggered H∞ load frequency control for networked power systems with energylimited DoS attacks. IEEE Trans Power Syst 99:1 |