共 47 条
[1]
Anand SC, 2022, Arxiv, DOI arXiv:2106.07071
[2]
Anand SC, 2023, Arxiv, DOI arXiv:2304.02055
[3]
Risk assessment and optimal allocation of security measures under stealthy false data injection attacks
[J].
2022 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS, CCTA,
2022,
:1347-1353
[4]
Anand SC, 2022, P AMER CONTR CONF, P5037, DOI 10.23919/ACC53348.2022.9867257
[6]
A Zero-Sum Game Framework for Optimal Sensor Placement in Uncertain Networked Control Systems under Cyber-Attacks
[J].
2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC),
2022,
:6126-6133
[7]
Beattie S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), P233
[8]
Bopardikar SD, 2016, 2016 RESILIENCE WEEK (RWS), P56, DOI 10.1109/RWEEK.2016.7573307
[9]
Caverly RJ, 2024, Arxiv, DOI arXiv:1903.08599
[10]
Chong MS, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P968, DOI [10.23919/ECC.2019.8795652, 10.23919/ecc.2019.8795652]