共 50 条
- [1] An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 267 - 272
- [2] Detection of Deception Attacks on the Backward Channel of Networked Control Systems [J]. PROCEEDINGS OF THE 31ST CHINESE CONTROL CONFERENCE, 2012, : 5972 - 5977
- [3] Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking [J]. 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 883 - 890
- [5] Detection of Deception Attacks in Supervisory Control Systems Using Bond Graph [J]. Automatic Control and Computer Sciences, 2020, 54 : 156 - 167
- [6] Detection and mitigation of deception attacks on cloud-based industrial control systems [J]. 25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 106 - 110
- [7] Active Detection for Exposing Intelligent Attacks in Control Systems [J]. 2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017), 2017, : 1306 - 1312
- [8] Recovery after Attacks of Deception on Networked Control Systems [J]. 2016 RESILIENCE WEEK (RWS), 2016, : 109 - 114
- [9] Detecting and Isolating Attacks of Deception in Networked Control Systems [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC), 2016, : 269 - 274
- [10] Synchronous Control of Master-slave Manipulator System under Deception Attacks [J]. PROCEEDINGS OF THE 32ND 2020 CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2020), 2020, : 1778 - 1782