A zonotopic set-invariance analysis of replay attacks affecting the supervisory layer
Tài liệu tham khảo
Sánchez, 2019, Bibliographical review on cyber attacks from a control oriented perspective, Annu. Rev. Control, 48, 103, 10.1016/j.arcontrol.2019.08.002
Teixeira, 2015, A secure control framework for resource-limited adversaries, Automatica, 51, 135, 10.1016/j.automatica.2014.10.067
Pasqualetti, 2013, Attack detection and identification in cyber-physical systems, IEEE Trans. Automat. Control, 58, 2715, 10.1109/TAC.2013.2266831
Cárdenas, 2008, Research challenges for the security of control systems.
Hashemi, 2018, A comparison of stealthy sensor attacks on control systems, 973
Liu, 2011, False data injection attacks against state estimation in electric power grids, ACM Trans. Inf. Syst. Secur., 14, 13, 10.1145/1952982.1952995
Teixeira, 2012, Revealing stealthy attacks in control systems, 1806
Smith, 2011, A decoupled feedback structure for covertly appropriating networked control systems, IFAC Proc. Vol., 44, 90, 10.3182/20110828-6-IT-1002.01721
Mo, 2009, Secure control against replay attacks, 911
Miao, 2013, Stochastic game approach for replay attack detection, 1854
Ferrari, 2017, Detection and isolation of replay attacks through sensor watermarking, IFAC-PapersOnLine, 50, 7363, 10.1016/j.ifacol.2017.08.1502
Fang, 2020, Optimal periodic watermarking schedule for replay attack detection in cyber–physical systems, Automatica, 112, 10.1016/j.automatica.2019.108698
Zhu, 2013, On the performance analysis of resilient networked control systems under replay attacks, IEEE Trans. Automat. Control, 59, 804, 10.1109/TAC.2013.2279896
Zhu, 2013, On distributed constrained formation control in operator–vehicle adversarial networks, Automatica, 49, 3571, 10.1016/j.automatica.2013.09.031
Mohan, 2020, A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems, Energies, 13, 3860, 10.3390/en13153860
Stoican, 2011
Murguia, 2020, Security metrics and synthesis of secure control systems, Automatica, 115, 10.1016/j.automatica.2019.108757
Kontouras, 2018, Set-theoretic detection of data corruption attacks on cyber physical power systems, J. Mod. Power Syst. Clean Energy, 6, 872, 10.1007/s40565-018-0452-y
Lucia, 2016, A set-theoretic approach for secure and resilient control of cyber-physical systems subject to false data injection attacks, 1
Franzè, 2019, Resilient control for cyber-physical systems subject to replay attacks, IEEE Control Syst. Lett., 3, 984, 10.1109/LCSYS.2019.2920507
Blanchini, 2008
Le, 2013
Kühn, 1998, Rigorously computed orbits of dynamical systems without the wrapping effect, Computing, 61, 47, 10.1007/BF02684450
Kolmanovsky, 1998, Theory and computation of disturbance invariant sets for discrete-time linear systems, Math. Probl. Eng., 4, 10.1155/S1024123X98000866
Blanchini, 1999, Set invariance in control, Automatica, 35, 1747, 10.1016/S0005-1098(99)00113-2
Franklin, 2002
Combastel, 2015, Zonotopes and Kalman observers: Gain optimality under distinct uncertainty paradigms and robust convergence, Automatica, 55, 265, 10.1016/j.automatica.2015.03.008
Alamo, 2005, Guaranteed state estimation by zonotopes, Automatica, 41, 1035, 10.1016/j.automatica.2004.12.008
Wang, 2018, Interval observer design for uncertain discrete-time linear systems, Systems Control Lett., 116, 41, 10.1016/j.sysconle.2018.04.003
Scott, 2014, Input design for guaranteed fault diagnosis using zonotopes, Automatica, 50, 1580, 10.1016/j.automatica.2014.03.016
Dobkin, 1993, Computing the intersection-depth of polyhedra, Algorithmica, 9, 518, 10.1007/BF01190153
Johansson, 2000, The quadruple-tank process: A multivariable laboratory process with an adjustable zero, IEEE Trans. Control Syst. Technol., 8, 456, 10.1109/87.845876
Olaru, 2010, Positive invariant sets for fault tolerant multisensor control schemes, Internat. J. Control, 83, 2622, 10.1080/00207179.2010.535215
Rakovic, 2005, Invariant approximations of the minimal robust positively invariant set, IEEE Trans. Automat. Control, 50, 406, 10.1109/TAC.2005.843854
Caro, 2004
Althoff, 2010, Computing reachable sets of hybrid systems using a combination of zonotopes and polytopes, Nonlinear Anal. Hybrid Syst., 4, 233, 10.1016/j.nahs.2009.03.009