Open Access
Issue
Security and Safety
Volume 1, 2022
Article Number 2022005
Number of page(s) 16
Section Industrial Control
DOI https://doi.org/10.1051/sands/2022005
Published online 22 July 2022
  1. Wolf W. Cyber-physical systems. Computer 2009; 42: 88–9. [CrossRef] [Google Scholar]
  2. Humayed A, Lin J and Li F et al. Cyber-physical systems security: a survey. IEEE Internet Things J 2017; 4: 1802–31. [CrossRef] [Google Scholar]
  3. Ashibani Y and Mahmoud QH. Cyber-physical systems security: analysis, challenges and solutions. Comput Secur 2017; 68: 81–97. [CrossRef] [Google Scholar]
  4. Weir M, Aggarwal S and Medeiros BD et al. Password cracking using probabilistic context-free grammars. In: 2009 30th IEEE Symposium on Security and Privacy, 17-20 May 2009, Oakland, CA, USA, 2009, 391–405. [Google Scholar]
  5. Houshmand S, Aggarwal S and Flood R. Next gen PCFG password cracking. IEEE Trans Inf Forensics Secur 2015; 10: 1776–91. [CrossRef] [Google Scholar]
  6. Ji S, Yang S and Hu X et al. Zero-sum password cracking game: a large-scale empirical study on the crackability, correlation, and security of passwords. IEEE Trans Dependable Secure Comput 2017; 14: 550–64. [CrossRef] [Google Scholar]
  7. Shayan M, Bhattacharjee S and Orozaliev A et al. Thwarting Bio-IP theft through dummy-valve-based obfuscation. IEEE Trans Inf Forensics Secur 2021; 16: 2076–89. [CrossRef] [Google Scholar]
  8. Kosut O, Jia L and Thomas RJ et al. Limiting false data attacks on power system state estimation. In: 2010 44th Annual Conference on Information Sciences and Systems (CISS), 17-19 March 2010, Princeton, NJ, 2010, 1–6. [Google Scholar]
  9. Xie L, Mo Y and Sinopoli B. Integrity data attacks in power market operations. IEEE Trans Smart Grid 2011; 2: 659–66. [CrossRef] [Google Scholar]
  10. Wu G, Jian S and Jie C. Optimal data injection attacks in cyber-physical systems. IEEE Trans Cybern 2018; 48: 3302–12. [CrossRef] [PubMed] [Google Scholar]
  11. Wu G, Wang G and Sun J et al. Optimal switching attacks and countermeasures in cyber-physical systems. IEEE Trans Syst Man Cybern Syst 2021; 51: 4825–35. [CrossRef] [Google Scholar]
  12. Imer O, Yüksel S and Başar T. Optimal control of LTI systems over unreliable communication links. Automatica 2006; 42: 1429–39. [CrossRef] [Google Scholar]
  13. Befekadu GK, Gupta V and Antsaklis PJ. Risk-sensitive control under Markov modulated denial-of-service (DoS) attack strategies. IEEE Trans Automat Contr 2015; 60: 3299–304. [CrossRef] [Google Scholar]
  14. Koning W. Infinite horizon optimal control of linear discrete time systems with stochastic parameters. Automatica 1982; 18: 443–53. [CrossRef] [Google Scholar]
  15. Katayama T. On the matrix Riccati equation for linear systems with random gain. IEEE Trans Automat Contr 1976; 21: 770–1. [CrossRef] [Google Scholar]
  16. Jiang X, Yang J and Jin G et al. RED-FT: A scalable random early detection scheme with flow trust against DoS attacks. IEEE Commun Lett 2013; 17: 1032–5. [CrossRef] [Google Scholar]
  17. Guo H, Pang Z-H and Sun J et al. An output-coding-based detection scheme against replay attacks in cyber-physical systems. IEEE Trans Circuits Syst II Express Br 2021; 68(10): 3306–10. [CrossRef] [Google Scholar]
  18. Mo Y, Chabukswar R and Sinopoli B. Detecting integrity attacks on scada systems. IEEE Trans Control Syst Technol 2014; 22: 1396–1407. [CrossRef] [Google Scholar]
  19. Mo Y, Weerakkody S and Sinopoli B. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst Mag 2015; 35: 93–109. [Google Scholar]
  20. Sinopoli B, Schenato L and Franceschetti M et al. Optimal control with unreliable communication: the TCP case. In: Proceedings of the 2005 American Control Conference, 8-10 June 2005, Portland, OR, USA, Vol. 5, 2005, 3354–59. [CrossRef] [Google Scholar]
  21. Zhang H, Cheng P and Shi L et al. Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Automat Contr 2015; 60: 3023–8. [CrossRef] [Google Scholar]
  22. Ding K, Li Y and Quevedo DE et al. A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica 2017; 78: 194–201. [CrossRef] [Google Scholar]
  23. Xu Y, Zhou J and Rao H et al. Reset moving horizon estimation for quantized discrete time systems. IEEE Trans Automat Contr 2021; 66: 4199–205. [CrossRef] [Google Scholar]
  24. Zhu M and Martínez S. On the performance analysis of resilient networked control systems under replay attacks. IEEE Trans Automat Contr 2014; 59: 804–8. [CrossRef] [Google Scholar]
  25. Farha F, Ning H and Yang S et al. Timestamp scheme to mitigate replay attacks in secure ZigBee networks. IEEE Trans Mob Comput 2022; 21: 342–51. [Google Scholar]
  26. Xu Y, Yang L and Wang Z et al. State estimation for networked systems with Markov driven transmission and buffer constraint. IEEE Trans Syst Man Cybern Syst 2021; 51: 7727–34. [CrossRef] [Google Scholar]
  27. Zhang H, Cheng P and Shi L et al. Optimal dos attack scheduling in wireless networked control system. IEEE Trans Control Syst Technol 2016; 24: 843–52. [CrossRef] [Google Scholar]
  28. Mo Y and Sinopoli B. Secure control against replay attacks. In: 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton, 2009, 911–8. [CrossRef] [Google Scholar]
  29. Dan Y, Tyz A and Ge G. Stochastic coding detection scheme in cyber-physical systems against replay attack. Inform Sci 2019; 481: 432–44. [CrossRef] [Google Scholar]
  30. Ferrari RMG and Teixeira AMH. Detection and isolation of replay attacks through sensor watermarking. In: IFACPapersOnLine, 6-8 July 2016, Boston, MA, USA, Vol. 50, 2017, 7363–68. [Google Scholar]
  31. Chen Y, Kar S and Moura JMF. Cyber-physical attacks with control objectives. IEEE Trans Automat Contr 2018; 63: 1418–25. [CrossRef] [Google Scholar]
  32. Wu G and Jian S. Optimal data integrity attack on actuators in cyber-physical systems. In: Proceedings of the 2016 American Control Conference, 9-14 July 2017, Toulouse, 2016. [Google Scholar]
  33. Liang L, Xing H and Lei D et al. Exploring adversarial attack in spiking neural networks with spike-compatible gradient. In: IEEE Transactions on Neural Networks and Learning Systems, 2021, in press. https://doi.org/10.1109/TNNLS.2021.3106961. [Google Scholar]
  34. Başar T and Olsder GJ. Dynamic Noncooperative Game Theory. Philadelphia: SIAM, 1998. [Google Scholar]
  35. Başar T and Bernhard P. H-Infinity Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach. Berlin: Springer Science & Business Media, 2008. [Google Scholar]
  36. Dorf RC and Bishop RH. Modern Control Systems, twelfth edition. Upper Saddle River, NJ: Pearson Prentice Hall, 2015. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.