共 21 条
[1]
[Anonymous], 1974, Complex Stochastic Processes: An Introduction to Theory and Application
[2]
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[4]
Grebeck M., 1998, TFRT7576 LTH DEP AUT, VTFRT-7576
[6]
Lee RM, 2016, Analysis of the Cyber Attack on the Ukrainian Power Grid
[7]
Miao F, 2014, IEEE DECIS CONTR P, P5776, DOI 10.1109/CDC.2014.7040293
[8]
PHYSICAL AUTHENTICATION OF CONTROL SYSTEMS DESIGNING WATERMARKED CONTROL INPUTS TO DETECT COUNTERFEIT SENSOR OUTPUTS
[J].
IEEE CONTROL SYSTEMS MAGAZINE,
2015, 35 (01)
:93-109
[9]
False Data Injection Attacks against State Estimation in Wireless Sensor Networks
[J].
49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC),
2010,
:5967-5972
[10]
Secure Control Against Replay Attacks
[J].
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2,
2009,
:911-918