共 21 条
- [1] Kim K.-D., Kumar P.R., Cyber–physical systems: A perspective at the centennial, Proc. IEEE, 100, pp. 1287-1308, (2012)
- [2] Assante M., Confirmation of A Coordinated Attack on The Ukrainian Power Grid, (2017)
- [3] Farwell J.P., Rohozinski R., Stuxnet and the future of cyber war, Survival, 53, 1, pp. 23-40, (2011)
- [4] Cardenas A.A., Amin S., Sastry S., Secure control: Towards survivable cyber-physical systems, Proc. IEEE 28th Int. Conf. Distrib. Comput. Syst. Workshops, pp. 495-500, (2008)
- [5] Zhang H., Cheng P., Shi L., Chen J., Optimal Denial-of-service attack scheduling with energy constraint, IEEE Trans. Autom. Control, 60, 11, pp. 3023-3028, (2015)
- [6] Teixeira A., Perez D., Sandberg H., Johansson K.H., Attack models and scenarios for networked control systems, Proc. 1st Int. Conf. High Confidence Netw. Syst., pp. 55-64, (2012)
- [7] Miao F., Pajic M., Pappas G.J., Stochastic game approach for replay attack detection, Proc. 52nd IEEE Conf. Decis. Control, pp. 1854-1859, (2013)
- [8] Li Y., Shi L., Chen T., Detection against linear deception attacks on multi-sensor remote state estimation, IEEE Trans. Control Netw. Syst.
- [9] Li Y., Quevedo D.E., Dey S., Shi L., SINR-based DoS attack on remote state estimation: A game-theoretic approach, IEEE Trans. Control Netw. Syst.
- [10] Zhu Q., Basar T., Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems, IEEE Control Syst, 35, 1, pp. 46-65, (2015)