共 23 条
- [1] Miao F., Zhu Q., Pajic M., Pappas G.J., Coding schemes for securing cyber-physical systems against stealthy data injection attacks, IEEE Trans. on Control of Network Systems, 4, 1, pp. 106-117, (2017)
- [2] Kim K.D., Kumar P.R., Cyber-physical systems: A perspective at the centennial, Proc. of the IEEE, 100, pp. 1287-1308, (2012)
- [3] Kong L.L., Analysis of deception models and detection algorithms on CPS control layer, (2015)
- [4] Jiang Y., Song H., Wang R., Gu M., Sun J., Sha L., Data-centered runtime verification of wireless medical cyber-physical system, IEEE Trans. on Industrial Informatics, 13, 4, pp. 1900-1909, (2017)
- [5] Jiang Y., Zhang H., Song X., Jiao X., Hung W.N.N., Gu M., Sun J., Bayesian-network-based reliability analysis of plc systems, IEEE Trans. on Industrial Electronics, 60, 11, pp. 5325-5336, (2013)
- [6] Yang K., Wang R., Jiang Y., Luo C., Guan Y., Li X., Shi Z., Enhanced resilient sensor attack detection using fusion interval and measurement history, Proc. of the 2018 Int'l Conf. on Hardware/Software Codesign and System Synthesis, pp. 1-3, (2018)
- [7] Cardenas A.A., Amin S., Sastry S., Secure control: Towards survivable cyber-physical systems, Proc. of the Int'l Conf. on Distributed Computing Systems Workshops, pp. 495-500, (2008)
- [8] Checkoway S., Mccoy D., Anderson D., Kantor B., Shacham H., Savage S., Koscher K., Czeskis A., Roesner F., Kohno T., Comprehensive experimental analyses of automotive attack surfaces, Proc. of the Usenix Conf. on Security, (2012)
- [9] Koscher K., Czeskis A., Roesner F., Et al., Experimental security analysis of a modern automobile, IEEE Journal of Selected Topics in Quantum Electronics, 41, 3, pp. 447-462, (2010)
- [10] Slay J., Miller M., Lessons learned from the maroochy water breach, Proc. of the Int'l Conf. on Critical Infrastructure Protection, pp. 73-82, (2007)