共 30 条
- [1] Giraldo J, Sarkar E, Cardenas A A, Et al., Security and privacy in cyber-physical systems: A survey of surveys, IEEE Design & Test, 34, 4, pp. 7-17, (2017)
- [2] Hu F, Lu Y, Vasilakos A V, Et al., Robust cyber-physical systems: Concept, models, and implementation, Future Generation Computer Systems, 56, pp. 449-475, (2016)
- [3] Mahmoud M S, Hamdan M M, Baroudi U A., Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges, Neurocomputing, 338, pp. 101-115, (2019)
- [4] Khan R, Maynard P, McLaughlin K, Et al., Threat analysis of BlackEnergy malware for synchrophasor based real-time control and monitoring in smart grid, BCS Learning & Development, 23, 7, pp. 53-63, (2016)
- [5] Li Y Z, Quevedo D E, Dey S, Et al., SINR-based DoS attack on remote state estimation: A game-theoretic approach, IEEE Transactions on Control of Network Systems, 4, 3, pp. 632-642, (2017)
- [6] Langner R., Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security & Privacy, 9, 3, pp. 49-51, (2011)
- [7] Sun Z W, Zhang Y Q., Research on attack modeling of industrial cyber physical systems, Control and Decision, 34, 11, pp. 2323-2329, (2019)
- [8] Wu G Y, Sun J, Chen J., Optimal data injection attacks in cyber-physical systems, IEEE Transactions on Cybernetics, 48, 12, pp. 3302-3312, (2018)
- [9] Zhang R C, Venkitasubramaniam P., Stealthy control signal attacks in linear quadratic Gaussian control systems: Detectability reward tradeoff, IEEE Transactions on Information Forensics and Security, 12, 7, pp. 1555-1570, (2017)
- [10] Sou K C, Sandberg H, Johansson K H., Computing critical k-tuples in power networks, IEEE Transactions on Power Systems, 27, 3, pp. 1511-1520, (2012)