共 50 条
[34]
POSTER: Defense against False Data Injection Attack in a Cyber-Physical System
[J].
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024,
2024,
:1943-1945
[35]
A Formal Approach to Cyber-Physical Attacks
[J].
2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2017,
:436-450
[36]
Reflective Attenuation of Cyber-Physical Attacks
[J].
COMPUTER SECURITY, ESORICS 2019,
2020, 11980
:19-34
[37]
Integrity Attacks on Cyber-Physical Systems
[J].
HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS,
2012,
:47-54
[39]
Detection of Stealthy False Data Injection Attacks Against Cyber-Physical Systems: A Stochastic Coding Scheme
[J].
Journal of Systems Science and Complexity,
2022, 35
:1668-1684
[40]
Detection and Performance Compensation for Linear ?-Stealthy Attacks in Cyber-Physical Systems
[J].
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS,
2023, 10 (03)
:1338-1349