A systems and control perspective of CPS security
Tóm tắt
Từ khóa
Tài liệu tham khảo
Abbas, 2018, Improving network connectivity and robustness using trusted nodes with application to resilient consensus, IEEE Transactions on Control of Network Systems, 5, 2036, 10.1109/TCNS.2017.2782486
Abdo, 2018, A safety/security risk analysis approach of industrial control systems: a cyber bowtie–combining new version of attack tree with bowtie analysis, Computers & Security, 72, 175, 10.1016/j.cose.2017.09.004
Abhinav, 2019, Resilient Cooperative Control of DC Microgrids, IEEE Transactions on Smart Grid, 10, 1083, 10.1109/TSG.2018.2872252
Accident to the Airbus A320-211, (2015) Registered D-AIPX and operated by Germanwings, flight GWI18G, on 03/24/15 at Prads-Haute-Blone, Available online at https://www.bea.aero/uploads/tx_elydbrapports/d-px150324.en.pdf (Accessed: 2018-08-3).
Adhikari, 2017, WAMS cyber-physical test bed for power system, cybersecurity study, and data mining, IEEE Transactions on Smart Grid, 8, 2744, 10.1109/TSG.2016.2537210
Ahmed, 2015, A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks, Frontiers of Computer Science, 9, 280, 10.1007/s11704-014-4212-5
Ahmed, 2018, Cooperative vehicular networking: a survey, IEEE Transactions on Intelligent Transportation Systems, 19, 996, 10.1109/TITS.2018.2795381
Alam, 2016, Introduction to intelligent transportation systems, 1
Algorand. (2018). Available online at https://www.algorand.com/ (Accessed: 2018-07-18).
Almalawi, 2014, An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems, Computers & Security, 46, 94, 10.1016/j.cose.2014.07.005
Amin, 2009, Safe and secure networked control systems under denial-of-service attacks, 31
Amin, 2013, Cyber security of water SCADA systems-part I: analysis and experimentation of stealthy deception attacks, IEEE Transactions on Control Systems Technology, 21, 1963, 10.1109/TCST.2012.2211873
Amin, 2013, Security of interdependent and identical networked control systems, Automatica, 49, 186, 10.1016/j.automatica.2012.09.007
Amoozadeh, 2015, Security vulnerabilities of connected vehicle streams and their impact on cooperative driving, IEEE Communications Magazine, 53, 126, 10.1109/MCOM.2015.7120028
Andersson, 2012, Cyber-security of SCADA systems, IEEE PES Innovative Smart Grid Technologies, 1
Annaswamy, 2016, Emerging research topics in control for smart infrastructures, Annual Reviews in Control, 42, 259, 10.1016/j.arcontrol.2016.10.001
Anwar, 2017, Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements, Journal of Computer and System Sciences, 83, 58, 10.1016/j.jcss.2016.04.005
Ashok, 2017, Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid, Proceedings of the IEEE, 105, 1389, 10.1109/JPROC.2017.2686394
Bai, 2015, Security in stochastic control systems: Fundamental limitations and performance bounds, 195
Bai, 2017, Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs, Automatica, 82, 251, 10.1016/j.automatica.2017.04.047
Barbosa, 2013, Flow whitelisting in SCADA networks, International Journal of Critical Infrastructure Protection, 6, 150, 10.1016/j.ijcip.2013.08.003
Baros, 2017
Barreno, 2006, Can machine learning be secure?, 16
Bi, 2017, Graph-based cyber security analysis of state estimation in smart power grid, IEEE Communications Magazine, 2, 10.1109/MCOM.2017.1600210C
Bishop, 2005
Bobba, 2012, Enhancing grid measurements: Wide area measurement systems, NASPInet, and security, IEEE Power Energy Magazine, 10, 67, 10.1109/MPE.2011.943133
Bradbury, 2012, SCADA: a critical vulnerability, Computer Fraud & Security, 11, 10.1016/S1361-3723(12)70030-1
Brown, 2018, Risk of cyber-physical attack via load with emulated inertia control, IEEE Transactions on Smart Grid, 9, 5854, 10.1109/TSG.2017.2697823
Brown, 2019, Security against impersonation attacks in distributed systems, IEEE Transactions on Control of Network Systems, 6, 440, 10.1109/TCNS.2018.2838519
Brown, P. N., & Marden, H. B. N. J. R. (2017). Are multiagent systems resilient to communication failures? arXiv:1711.00609.
Bruneau, 2003, A framework to quantitatively assess and enhance the seismic resilience of communities, Earthquake Spectra, 19, 733, 10.1193/1.1623497
Burmester, 2012, Modeling security in cyber–physical systems, International Journal of Critical Infrastructure Protection, 5, 118, 10.1016/j.ijcip.2012.08.002
Cárdenas, 2011, Attacks against process control systems: risk assessment, detection, and response, 355
Cárdenas, 2008, Research challenges for the security of control systems
Cardenas, 2008, Secure control: Towards survivable cyber-physical systems, 495
Case, 2016, Analysis of the cyber attack on the Ukrainian power grid, Electricity Information Sharing and Analysis Center (E-ISAC)
Cetinkaya, 2017, Networked control under random and malicious packet losses, IEEE Transactions on Automatic Control, 62, 2434, 10.1109/TAC.2016.2612818
Cetinkaya, 2019, An overview on Denial-of-Service attacks in control systems: Attack models and security analyses, Entropy, 21
Chakhchoukh, 2015, Coordinated cyber-attacks on the measurement function in hybrid state estimation, IEEE Transactions on Power Systems, 30, 2487, 10.1109/TPWRS.2014.2357182
Chakhchoukh, 2017, LTS-based robust hybrid SE integrating correlation, IEEE Transactions on Power Systems, 32, 3127, 10.1109/TPWRS.2016.2632723
Chen, 2015
Chen, 2017, Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: a contract design approach, IEEE Transactions on Information Forensics and Security, 12, 2736, 10.1109/TIFS.2017.2718489
Chen, 2014, A study on Advanced Persistent Threats, 63
Chen, 2010, Stuxnet, the real start of cyber warfare?[Editor’s note], IEEE Network, 24, 2, 10.1109/MNET.2010.5634434
Chen, 2017, Dynamic attack detection in cyber-physical systems with side initial state information, IEEE Transactions on Automatic Control, 62, 4618, 10.1109/TAC.2016.2626267
Cherdantseva, 2016, A review of cyber security risk assessment methods for SCADA systems, Computers & Security, 56, 1, 10.1016/j.cose.2015.09.009
Cherdantseva, 2012
Cherdantseva, 2013, A reference model of information assurance & security, 546
Cho, 2017, Cyber security in nuclear industry–Analytic study from the terror incident in nuclear power plants (NPPs), Annals of Nuclear Energy, 99, 47, 10.1016/j.anucene.2016.09.024
Chung, 1997
Clark, 2013, An impact-aware defense against Stuxnet, 4140
Corts, 2016, Differential privacy in control and network systems, 4252
Cyber security and resilience of intelligent public transport: Good practices and recommendations. Technical Report. (2016) European Union Agency For Network And Information Security. Available online at https://www.enisa.europa.eu/publications/good-practices-recommendations/at_download/fullReport (Accessed: 2019-01-15).
Cybersecurity Funding 21. Cybersecurity Funding. (2019) Retrieved from https://www.whitehouse.gov/ (Accessed: 2019-01-15).
Darup, 2018, Towards encrypted MPC for linear constrained systems, IEEE Control Systems Letters, 2, 195, 10.1109/LCSYS.2017.2779473
Data Breach Investigations Report, 2009
Data Breach Investigations Report. (2015). Technical Report, Retrieved from https://www.verizonenterprise.com/ (Accessed: 2019-01-15).
De Persis, 2001, A geometric approach to nonlinear fault detection and isolation, IEEE Transactions on Automatic Control, 46, 853, 10.1109/9.928586
De Persis, 2014, On resilient control of nonlinear systems under denial-of-service, 5254
De Persis, 2015, Input-to-state stabilizing control under Denial-of-Service, IEEE Transactions on Automatic Control, 60, 2930, 10.1109/TAC.2015.2416924
De Persis, 2018, A comparison among deterministic packet-dropouts models in networked control systems, IEEE Control Systems Letters, 2, 109, 10.1109/LCSYS.2017.2759423
Dibaji, 2017, Resilient consensus of second-order agent networks: Asynchronous update rules with delays, Automatica, 81, 123, 10.1016/j.automatica.2017.03.008
Dibaji, 2018, Resilient randomized quantized consensus, IEEE Transactions on Automatic Control, 63, 2508, 10.1109/TAC.2017.2771363
Dibaji, 2018, Secure control of power systems: Confidentiality and integrity threats, 7269
Dibaji, 2019, Resilient distributed averaging
Diffie, 1976, New directions in cryptography, IEEE Transactions on Information Theory, 22, 644, 10.1109/TIT.1976.1055638
Ding, 2018, A survey on security control and attack detection for industrial cyber-physical systems, Neurocomputing, 275, 1674, 10.1016/j.neucom.2017.10.009
Ding, 2017, A multi-channel transmission schedule for remote state estimation under DoS attacks, Automatica, 78, 194, 10.1016/j.automatica.2016.12.020
Ding, 2016, Deception-based sensor scheduling for remote estimation under DoS attacks, 169
Do, 2017, 21, 746
du Pin Calmon, 2012, Privacy against statistical inference, 1401
Dwork, 2011, Differential privacy, 338
Fagnant, 2015, Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations, Transportation Research Part A: Policy and Practice, 77, 167
Falliere, N., Murchu, L. O., & Chien, E. (2018). W32. Stuxnet dossier: Symantec security response. Technical Report, Symantec, Available online at https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf (Accessed: 2018-08-05).
Farokhi, 2017, Secure and private control using semi-homomorphic encryption, Control Engineering Practice, 67, 13, 10.1016/j.conengprac.2017.07.004
Farokhi, 2017, Private and secure coordination of match-making for heavy-duty vehicle platooning, 7345
Fawzi, 2012, Security for control systems under sensor and actuator attacks, Proceedings of IEEE conference on decision and control, 3412
Fawzi, 2014, Secure estimation and control for cyber-physical systems under adversarial attacks, IEEE Transactions on Automatic Control, 59, 1454, 10.1109/TAC.2014.2303233
Felegyhazi, 2006, Game theory in wireless networks: A tutorial
Ferdowsi, A., Saad, W., & Mandayam, N. B. (2017). Colonel Blotto game for secure state estimation in interdependent critical infrastructure. arXiv:1709.09768.
Ferrari, 2017, Detection and isolation of routing attacks through sensor watermarking, 5436
Ferrari, 2017, Detection and isolation of replay attacks through sensor watermarking, 7363
Flamholz, 2019, Baiting for defense against stealthy attacks on cyber-physical systems, 2338
Fovino, 2009, An experimental investigation of malware attacks on scada systems, International Journal of Critical Infrastructure Protection, 2, 139, 10.1016/j.ijcip.2009.10.001
Frasca, 2015, Distributed randomized algorithms for opinion formation, centrality computation and power systems estimation: A tutorial overview, European Journal of Control, 24, 2, 10.1016/j.ejcon.2015.04.002
Garcia-Teodoro, 2009, Anomaly-based network intrusion detection: Techniques, systems and challenges, Computers & Security, 28, 18, 10.1016/j.cose.2008.08.003
GhasemiGol, 2016, A comprehensive approach for network attack forecasting, Computers & Security, 58, 83, 10.1016/j.cose.2015.11.005
Gil, 2017, Guaranteeing spoof-resilient multi-robot networks, Autonomous Robots, 41, 1383, 10.1007/s10514-017-9621-5
Giraldo, 2018, A survey of physics-based attack detection in cyber-physical systems, ACM Computing Surveys, 51, Artilce76, 10.1145/3203245
Góes, 2017, Stealthy deception attacks for cyber-physical systems, 4224
Gomez-Exposito, 2004
Greenberg, 2018
Greenberg, 2017
Gross, 2005
Guerrero-Bonilla, 2017, Formations for resilient robot teams, IEEE Robotics and Automation Letters, 2, 841, 10.1109/LRA.2017.2654550
Guo, 2017, Optimal linear cyber-attack on remote state estimation, IEEE Transactions on Control of Network Systems, 4, 4, 10.1109/TCNS.2016.2570003
Guo, 2018, Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 89, 117, 10.1016/j.automatica.2017.11.018
Gupta, 2010, Optimal control in the presence of an intelligent jammer with limited actions, 1096
Gupta, 2017, Privacy in distributed average consensus, 9515
Gusrialdi, 2019, Smart grid security: Attacks and defenses, 199
Hackmageddon: Information security timelines and statistics. Accessed: 2018-08-3. https://www.hackmageddon.com/.
Harding, 2014, Vehicle-to-vehicle communications: Readiness of V2V technology for application
Hartmann, 2013, The vulnerability of UAVs to cyber attacks-An approach to the risk assessment, 1
Haus, 2014, Trust-based self-organising network control, IET Control Theory & Applications, 8, 2126, 10.1049/iet-cta.2014.0333
He, 2016, Real-time detection of false data injection attacks in smart grids: A deep learning-based intelligent mechanism, IEEE Transactions on Smart Grid, 8, 1
Heemels, 2012, An introduction to event-triggered and self-triggered control, 3270
Hein, 2017, Formal guarantees on the robustness of a classifier against adversarial manipulation, 2266
Hirzallah, 2018, On the computation of worst attacks: a LP framework, 4527
Hoehn, 2016, Detection of covert attacks and zero dynamics attacks in cyber-physical systems, 302
Hoory, 2006, Expander graphs and their applications, Bulletin of the American Mathematical Society, 43, 439, 10.1090/S0273-0979-06-01126-8
Hoppe, 2008, Security threats to automotive can networks–practical examples and selected short-term countermeasures, 235
Horák, 2017, Manipulating adversarys belief: A dynamic game approach to deception by design for proactive network security, 273
Hu, 2018, State estimation under false data injection attacks: Security analysis and system protection, Automatica, 87, 176, 10.1016/j.automatica.2017.09.028
Huang, 2011, Adversarial machine learning, 43
Huang, S., Papernot, N., Goodfellow, I., Duan, Y., & Abbeel, P. (2017). Adversarial attacks on neural network policies. arXiv:1702.02284.
Huang, 2018, An Online Detection Framework for Cyber Attacks on Automatic Generation Control, IEEE Transactions on Power Systems, 33, 6816, 10.1109/TPWRS.2018.2829743
Huitsing, 2008, Attack taxonomies for the modbus protocols, International Journal of Critical Infrastructure Protection, 1, 37, 10.1016/j.ijcip.2008.08.003
Humayed, 2017, Cyber-physical systems securitya survey, IEEE Internet of Things Journal, 4, 1802, 10.1109/JIOT.2017.2703172
Jafarnejadsani, 2017, Dual-rate ℓ1 adaptive controller for cyber-physical sampled-data systems, 6259
Jafarnia-Jahromi, 2012, GPS vulnerability to spoofing threats and a review of antispoofing techniques, International Journal of Navigation and Observation, 1, 10.1155/2012/127072
Jajodia, 2011, Vol. 54
Javed, 2017, On the interrelation of security, QoS, and safety in cooperative ITS, IEEE Transactions on Intelligent Transportation Systems, 18, 1943, 10.1109/TITS.2016.2614580
Jiang, 2006, Trust evaluation in anarchy: A case study on autonomous networks, 1
Kailkhura, B., Han, Y. S., Brahma, S., & Varshney, P. K. (2013). Distributed Bayesian detection with Byzantine data. arXiv:1307.3544.
Katz, 1996
Kern, 2007
Khan, 2013, Secure distributed estimation in cyber-physical systems, 5209
Khanafer, 2013, 1
Khargonekar, 2015, Enabling research for infrastructure resilience: An NSF perspective
Khazraei, 2017, Replay attack detection in a multi agent system using stability analysis and loss effective watermarking, 4778
Kikuya, 2018, Fault-tolerant clock synchronization over unreliable channels in wireless sensor networks, IEEE Transactions on Control of Network Systems, 5, 1551, 10.1109/TCNS.2017.2732169
Kim, 2016, Zero-stealthy attack for sampled-data control systems: The case of faster actuation than sensing, 5956
Ko, 2016, Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems, 416
Koscher, 2010, Experimental security analysis of a modern automobile, Proceedings of IEEE symposium on security and privacy, 447
Krotofil, 2014, Vulnerabilities of cyber-physical systems to stale data determining the optimal time to launch attacks, International Journal of Critical Infrastructure Protection, 7, 213, 10.1016/j.ijcip.2014.10.003
Kurmanaev, 2019
Kwon, 2014, Analysis and design of stealthy cyber attacks on unmanned aerial systems, Journal of Aerospace Information Systems, 11, 525, 10.2514/1.I010201
La, 2017, Estimation of externalities in interdependent security: A case study of large systems, 3961
Lamnabhi-Lagarrigue, 2017, Systems & control for the future of humanity, research agenda: Current and future roles, impact and grand challenges, Annual Reviews in Control, 43, 1, 10.1016/j.arcontrol.2017.04.001
LeBlanc, 2018, Resilient first-order consensus and weakly stable, higher order synchronization of continuous-time networked multiagent systems, IEEE Transactions on Control of Network Systems, 5, 1219, 10.1109/TCNS.2017.2696364
LeBlanc, 2013, Resilient asymptotic consensus in robust networks, IEEE Journal on Selected Areas in Communications, 31, 766, 10.1109/JSAC.2013.130413
Lei, 2016, Event-based distributed state estimation over a WSN with false data injection attack, 286
Li, 2017, Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system, Journal of Parallel and Distributed Computing, 103, 32, 10.1016/j.jpdc.2016.12.012
Li, 2017, Cybersecurity in distributed power systems, Proceedings of the IEEE, 105, 1367, 10.1109/JPROC.2017.2687865
Liang, 2017, A review of false data injection attacks against modern power systems, IEEE Transactions on Smart Grid, 8, 1630, 10.1109/TSG.2015.2495133
Liao, 2018, Optimization algorithms for catching data manipulators in power system estimation loops, IEEE Transactions on Control Systems Technology, 1
Lippmann, 2000, Improving intrusion detection performance using keyword selection and neural networks, Computer Networks, 34, 597, 10.1016/S1389-1286(00)00140-7
Liu, 2017, Resilient control strategy of cyber-physical system under DoS attacks, 7760
Liu, 2017, False data attack models, impact analyses and defense strategies in the electricity grid, The Electricity Journal, 30, 35, 10.1016/j.tej.2017.04.001
Liu, 2009, 14, 21
Lu, 2016, On resilience analysis and quantification for wide-area control of power systems, 5799
Lucia, W., Sinopoli, B., & Franze, G. (2016). Networked constrained cyber-physical systems subject to malicious attacks: A resilient set-theoretic control approach. arXiv:1603.07984.
Lynch, 1996
Macwan, 2016, Collaborative defense against data injection attack in iec61850 based smart substations, 1
Magiera, 2015, Detection and mitigation of gps spoofing based on antenna array processing, Journal of Applied Research and Technology, 13, 45, 10.1016/S1665-6423(15)30004-3
Manadhata, 2011, An attack surface metric, IEEE Transactions on Software Engineering, 37, 371, 10.1109/TSE.2010.60
Manshaei, 2013, Game theory meets network security and privacy, ACM Computing Surveys, 45, 53, 10.1145/2480741.2480742
Marden, 2009, Cooperative control and potential games, IEEE Transactions on Systems, Man, and Cybernetics, 39, 1393, 10.1109/TSMCB.2009.2017273
Massoumnia, 1989, Failure detection and identification, IEEE Transactions on Automatic Control, 34, 316, 10.1109/9.16422
McLaughlin, 2016, The cybersecurity landscape in industrial control systems, Proceedings of the IEEE, 104, 1039, 10.1109/JPROC.2015.2512235
Miao, 2018, A hybrid stochastic game for secure control of cyber-physical systems, Automatica, 93, 55, 10.1016/j.automatica.2018.03.012
Mikulski, 2011, Trust dynamics in multi-agent coalition formation
Mikulski, 2014, Trust-based coalition formation in multi-agent systems, The Journal of Defense Modeling and Simulation, 11, 19, 10.1177/1548512912454763
Milanese, 2013
Milani, 2018, Equilibrium point analysis and power sharing methods for distribution systems driven by solid-state transformers, IEEE Transactions on Power Systems, 33, 1473, 10.1109/TPWRS.2017.2720540
Miloševič, 2017, Analysis and mitigation of bias injection attacks against a Kalman filter, 8393
Mishra, 2017, Secure state estimation against sensor attacks in the presence of noise, IEEE Transactions on Control of Network Systems, 4, 49, 10.1109/TCNS.2016.2606880
Mitra, 2018, Distributed observers for LTI systems, IEEE Transactions on Automatic Control, 63, 3689, 10.1109/TAC.2018.2798998
Mo, 2014, Detecting integrity attacks on scada systems, IEEE Transactions on Control Systems Technology, 22, 1396, 10.1109/TCST.2013.2280899
Mo, 2014, Resilient detection in the presence of integrity attacks, IEEE Transactions on Signal Processing, 62, 31, 10.1109/TSP.2013.2284145
Mo, 2017, Privacy preserving average consensus, IEEE Transactions on Automatic Control, 62, 753, 10.1109/TAC.2016.2564339
Mo, 2015, Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs, IEEE Control Systems Magazine, 35, 93, 10.1109/MCS.2014.2364724
Moghadam, R., & Modares, H. (2017). Attack analysis for distributed control systems: An internal model principle approach. arXiv:1710.03856.
Momani, M., & Challa, S. (2010). Survey of trust models in different network domains. arXiv:1010.0168.
Motwani, 2010
Murguia, 2017, Reachable sets of hidden CPS sensor attacks: Analysis and synthesis tools
Naghnaeian, M., Hirzallah, N., & Voulgaris, P. G. (2015). Dual rate control for security in cyber-physical systems. arXiv:1504.07586.
Ng, 2018
Nicol, 2004, Model-based evaluation: from dependability to security, IEEE Transactions on Dependable and Secure Computing, 1, 48, 10.1109/TDSC.2004.11
Nordell, 2012, Terms of protection: The many faces of smart grid security, IEEE Power and Energy Magazine, 10, 18, 10.1109/MPE.2011.943194
Nozari, 2017, Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, Automatica, 81, 221, 10.1016/j.automatica.2017.03.016
Ntalampiras, 2016, Automatic identification of integrity attacks in cyber-physical systems, Expert Systems with Applications, 58, 164, 10.1016/j.eswa.2016.04.006
Nudell, 2015, A real-time attack localization algorithm for large power system networks using graph-theoretic techniques, IEEE Transactions on Smart Grid, 6, 2551, 10.1109/TSG.2015.2406571
Onyeji, 2014, Cyber security and critical energy infrastructure, The Electricity Journal, 27, 52, 10.1016/j.tej.2014.01.011
Pajic, 2017, Attack-resilient state estimation for noisy dynamical systems, IEEE Transactions on Control of Network Systems, 4, 82, 10.1109/TCNS.2016.2607420
Pal, 2018, Classification and detection of PMU data manipulation attacks using transmission line parameters, IEEE Transactions on Smart Grid, 9, 5057, 10.1109/TSG.2017.2679122
Pan, 1999, H–infinity control of large scale jump linear systems via averaging and aggregation, International Journal of Control, 72, 866, 10.1080/002071799220605
Parkinson, 2017, Cyber threats facing autonomous and connected vehicles: Future challenges, IEEE Transactions on Intelligent Transportation Systems, 18, 2898, 10.1109/TITS.2017.2665968
Pasqualetti, 2012, Consensus computation in unreliable networks: A system theoretic approach, IEEE Transactions on Automatic Control, 57, 90, 10.1109/TAC.2011.2158130
Pasqualetti, 2013, Attack detection and identification in cyber-physical systems, 58, 2715
Pasqualetti, 2015, Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems, IEEE Control Systems Magazine, 35, 110, 10.1109/MCS.2014.2364725
Pasqualetti, 2015, A divide-and-conquer approach to distributed attack identification, 5801
Pawlick, 2015, Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats, 289
Petit, 2015, Potential cyberattacks on automated vehicles, IEEE Transactions on Intelligent Transportation Systems, 16, 546
Pirani, 2016, On the smallest eigenvalue of grounded Laplacian matrices, IEEE Transaction on Automatic Control, 61, 509
Pramod, 2015, Polynomial based scheme for secure SCADA operations, Procedia Technology, 21, 474, 10.1016/j.protcy.2015.10.027
Presidential Policy Directive 21: Critical Infrastructure Security and Resilience. Retrieved from https://obamawhitehouse.archives.gov.
Rani, 2016, Security of unmanned aerial vehicle systems against cyber-physical attacks, The Journal of Defense Modeling and Simulation, 13, 331, 10.1177/1548512915617252
Reddy, 2013, Neural networks for intrusion detection and its applications, Vol. 2, 3
Rezai, 2013, Secure SCADA communication by using a modified key management scheme, ISA Transactions, 52, 517, 10.1016/j.isatra.2013.02.005
Rieger, 2009, Resilient control systems: Next generation design research, 632
Rus, 2018
Shitharth, 2017, An enhanced optimization based algorithm for intrusion detection in SCADA network, Computers & Security, 70, 16, 10.1016/j.cose.2017.04.012
Saltzer, 1975, The protection of information in computer systems, Proceedings of the IEEE, 63, 1278, 10.1109/PROC.1975.9939
Sandberg, 2015, Special issue on cyberphysical security in networked control systems, IEEE Control Systems Magazine, 35
Sandberg, 2010, On security indices for state estimators in power networks
Sandberg, 2016, From control system security indices to attack identifiability, 1
Sanjab, 2016, On bounded rationality in cyber-physical systems security: Game-theoretic analysis with application to smart grid protection, 10.1109/CPSRSG.2016.7684101
Sanjab, A., Saad, W., & Başar, T. (2017). Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game. arXiv:1702.04240.
Sanjab, 2016
Satchidanandan, 2017, Dynamic watermarking: Active defense of networked cyber–physical systems, Proceedings of the IEEE, 105, 219, 10.1109/JPROC.2016.2575064
Satchidanandan, 2018, Control systems under attack: The securable and unsecurable subspaces of a linear stochastic system, Emerging Applications of Control and Systems Theory, 217, 10.1007/978-3-319-67068-3_16
Satchidanandan, 2018, On the operational significance of the securable subspace for partially observed linear stochastic systems, Proceedings of IEEE conference on decision and control, 2068
Shahrivar, 2017, Spectral and structural properties of random interdependent networks, Automatica, 83, 234, 10.1016/j.automatica.2017.06.024
Shannon, 1949, Communication theory of secrecy systems, Bell System Technical Journal, 28, 656, 10.1002/j.1538-7305.1949.tb00928.x
Sherif, 2017, Privacy-preserving ride sharing scheme for autonomous vehicles in big data era, IEEE Internet of Things Journal, 4, 611, 10.1109/JIOT.2016.2569090
Shoukry, 2018, SMT-based observer design for cyber-physical systems under sensor attacks, ACM Transactions on Cyber-Physical Systems, 2, 5, 10.1145/3078621
Siegel, 2018, A survey of the connected vehicle landscape architectures, enabling technologies, applications, and development areas, IEEE Transactions on Intelligent Transportation Systems, 19, 2391, 10.1109/TITS.2017.2749459
Slay, 2007, Lessons learned from the Maroochy water breach, 73
Sniper attack on California power grid may have been ‘an insider,’ DHS says. (2015), Availble online at https://money.cnn.com/2015/10/16/technology/sniper-power-grid/index.html (Accessed: 2018-08-05).
Sridhar, 2012, Cyber-physical system security for the electric power grid, Proceedings of the IEEE, 100, 210, 10.1109/JPROC.2011.2165269
Stoustrup, 2019
Sucasas, 2016, An autonomous privacy-preserving authentication scheme for intelligent transportation systems, Computers & Security, 60, 193, 10.1016/j.cose.2016.04.006
Sun, 2017, Resilient control of networked control systems with stochastic denial of service attacks, Neurocomputing, 270, 170, 10.1016/j.neucom.2017.02.093
Sun, 2018, Security-based resilient event-triggered control of networked control systems under denial of service attacks, Journal of the Franklin Institute, 10.1016/j.jfranklin.2018.06.009
Sundaram, 2016, Secure local filtering algorithms for distributed optimization, 1871
Sundaram, 2011, Distributed function calculation via linear iterative strategies in the presence of malicious agents, IEEE Transactions on Automatic Control, 56, 1495, 10.1109/TAC.2010.2088690
Tanaka, 2017, Directed information and privacy loss in cloud-based control, 1666
Teixeira, 2010, Cyber security analysis of state estimators in electric power systems, 5991
Teixeira, 2012, Revealing stealthy attacks in control systems, 1806
Teixeira, 2015, A secure control framework for resource-limited adversaries, Automatica, 51, 135, 10.1016/j.automatica.2014.10.067
Teixeira, 2015, Secure control systems: A quantitative risk management approach, IEEE Control Systems Magazine, 35, 24, 10.1109/MCS.2014.2364709
Ten, 2011, Anomaly detection for cybersecurity of the substations, IEEE Transactions on Smart Grid, 2, 865, 10.1109/TSG.2011.2159406
Ten, 2008, Vulnerability assessment of cybersecurity for SCADA systems, IEEE Transactions on Power Systems, 23, 1836, 10.1109/TPWRS.2008.2002298
Tranquillus, 1957
Tsai, 2009, Intrusion detection by machine learning: A review, Expert Systems with Applications, 36, 11994, 10.1016/j.eswa.2009.05.029
Ugrinovskii, 2017, Controller–jammer game models of denial of service in control systems operating over packet-dropping links, Automatica, 84, 128, 10.1016/j.automatica.2017.07.009
Usevitch, J., & Panagou, D. (2018a). Determining r-robustness of arbitrary digraphs using zero-one linear integer programming. arXiv:1810.01784.
Usevitch, J., & Panagou, D. (2018b). Resilient leader-follower consensus to arbitrary reference values. arXiv:1802.09654.
Vamvoudakis, 2018, Cooperative Q-learning for rejection of persistent adversarial inputs in unknown networked systems, IEEE Transactions on Automatic Control, 63, 1018, 10.1109/TAC.2017.2734840
Vamvoudakis, 2018, Game-theory-based consensus learning of double-integrator agents in the presence of worst-case adversaries, Journal of Optimization Theory and Applications, 177, 222, 10.1007/s10957-018-1268-7
Vamvoudakis, 2014, Detection in adversarial environments, IEEE Transactions on Automatic Control, 59, 3209, 10.1109/TAC.2014.2351671
Wang, 2016, Recent advances on filtering and control for cyber-physical systems under security and resource constraints, Journal of the Franklin Institute, 353, 2451, 10.1016/j.jfranklin.2016.04.011
Wang, 2013, Cyber security in the smart grid: Survey and challenges, Computer Networks, 57, 1344, 10.1016/j.comnet.2012.12.017
Watts, 2003, Security and vulnerability in electric power systems, 2, 559
Weerakkody, 2017, A graph-theoretic characterization of perfect attackability for secure design of distributed control systems, IEEE Transactions on Control of Nerwork Systems, 4, 60, 10.1109/TCNS.2016.2573741
Weerakkody, 2014, 3757
Weerakkody, 2017, A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems, 966
Weerakkody, 2015, Detecting integrity attacks on control systems using a moving target approach, 5820
Weerakkody, S., & Sinopoli, B. (2016). A moving target approach for identifying malicious sensors in control systems. arXiv:1609.09043.
Wiese, 2018, Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, IEEE Transactions on Automatic Control
Woo, 2015, A practical wireless attack on the connected car and security protocol for in-vehicle CAN, IEEE Transactions on Intelligent Transportation Systems, 16, 993
Wu, 2017, A game-theoretic approach to remote state estimation in presence of a DoS attacker, 2595
Xie, 2011, Integrity data attacks in power market operations, IEEE Transactions on Smart Grid, 2, 659, 10.1109/TSG.2011.2161892
Xue, 2014, Security concepts for the dynamics of autonomous vehicle networks, Automatica, 50, 852, 10.1016/j.automatica.2013.12.001
Yan, 2013, Distributed autonomous online learning: Regrets and intrinsic privacy-preserving properties, IEEE Transactions on Knowledge and Data Engineering, 25, 2483, 10.1109/TKDE.2012.191
Yan, 2013, A survey on smart grid communication infrastructures: Motivations, requirements and challenges, IEEE Communication Surveys & Tutorials, 15, 5, 10.1109/SURV.2012.021312.00034
Yang, 2015, A new cyber security risk evaluation method for oil and gas SCADA based on factor state space, Chaos, Solitons and Fractals, 89, 203, 10.1016/j.chaos.2015.10.030
Yang, 2017, Event-based distributed state estimation under deception attack, Neurocomputing, 270, 145, 10.1016/j.neucom.2016.12.109
Yuan, 2015, Security in cyber-physical systems: Controller design against known-plaintext attack, 5814
Zeldovich, 2014
Zero Days, 2016
Zhang, 2015, A notion of robustness in complex networks, IEEE Transactions on Control of Network Systems, 2, 310, 10.1109/TCNS.2015.2413551
Zhao, 2015, Distributed frequency control for stability and economic dispatch in power networks, 2359
Zhao, 2017, Adaptive sliding mode fault tolerant control for nonlinearly chaotic systems against DoS attack and network faults, Journal of the Franklin Institute, 354, 6520, 10.1016/j.jfranklin.2017.08.005
Zhu, 2011, Robust and resilient control design for cyber-physical systems with an application to power systems, 4066
Zhu, 2013, Resilient distributed control of multi-agent cyber-physical systems, 301
Zhu, 2010, Network security configurations: A nonzero-sum stochastic game approach, 1059