共 19 条
- [1] CONTI M, DAS S K, BISDIKIAN C, Et al., Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence, Pervasive and Mobile Computing, 8, pp. 2-21, (2012)
- [2] CHIEN D., Systems and methods for suppressing denial of service attacks
- [3] LI B, XIAO G, LU R, Et al., On feasibility and limitations of detecting false data injection attacks on power grid state estimation using D-FACTS devices, IEEE Transactions on Industrial Informatics, 16, 2, pp. 854-864, (2020)
- [4] TEIXEIRA A, AMIN S, SANDBERG H, Et al., Cyber security analysis of state estimators in electric power systems, 49th IEEE Conference on Decision and Control, pp. 5991-5998, (2010)
- [5] MO Y, SINOPOLI B., Secure control against replay attacks, 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911-918, (2010)
- [6] WANG C Q., Elastic control of information physical system under false data injection attack, (2018)
- [7] QIN J, LI M, SHI L, Et al., Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks, IEEE Transactions on Automatic Control, 63, 6, pp. 1648-1663, (2018)
- [8] ZHUANG K X, SUN Z W., A detection model for denial of service attacks in industrial information physics systems, Control Theory and Application, 37, 3, pp. 629-638, (2020)
- [9] AO W, SONG Y, WEN C, Et al., Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries, Information Sciences, 451-452, pp. 67-82, (2018)
- [10] CHONG M S, WAKAIKI M, HESPANHA J P., Observability of linear systems under adversarial attacks, American Control Conference, pp. 2439-2444, (2015)