共 14 条
[1]
Stealthy Deception Attacks on Water SCADA Systems
[J].
HSSC 10: PROCEEDINGS OF THE 13TH ACM INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL,
2010,
:161-170
[2]
[Anonymous], 2011, GUIDE IND CONTROL SY
[3]
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[6]
Karnouskos S, 2011, IEEE IND ELEC, P4490
[7]
Longhua Ma, 2010, Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications (GreenCom) and Int'l Conference on Cyber, Physical and Social Computing (CPSCom), P516, DOI 10.1109/GreenCom-CPSCom.2010.75
[8]
Secure Control Against Replay Attacks
[J].
2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2,
2009,
:911-918
[9]
Mo Yilin, 2010, 1 WORKSH SEC CONTR S, P1
[10]
Moghaddam R. R., 2012, POW EL MACH DRIV PEM, P1, DOI DOI 10.1109/PESGM.2012.6345149