[1] Derler P, Lee E A, Vincentelli A S. Modeling cyber-physical systems[J]. Proc of the IEEE, 2012, 100(1): 13-28
[2] Alguliyev R , Imamverdiyev Y , Sukhostat L . Cyber-physical systems and their security issues[J]. Computers in Industry, 2018, 100:212-223
[3] 刘烃, 田决, 王稼舟, 等. 信息物理融合系统综合安全威胁与防御研究[J]. 自动化学报, 2019, 45(1):5-24
[4] Ding Derui, Han Qinglong, Xiang Yang, et al. A survey on security control and attack detection for industrial cyber-physical systems[J]. Neurocomputing, 2018, 275:1674-1683
[5] 张恒. 信息物理系统安全理论研究[D]. 杭州:浙江大学, 2015
[6] Chen Jiming, Shi Ling, Cheng Peng, et al. Optimal Denial-of-Service attack scheduling with energy constraint[J]. IEEE Trans on Automatic Control, 2015, 60(11):3023-3028
[7] Zhang Heng, Cheng Peng, Shi Ling, et al. Optimal DoS attack scheduling in wireless networked control system[J]. IEEE Trans on Control System Technology, 2016, 24(3): 843-852
[8] Peng Lianghong, Cao Xianghui, Sun Changyin, et al. Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems[J]. Neurocomputing, 2018, 272: 571-583
[9] Amin S , Alvaro A. Cárdenas, Sastry S S. Safe and secure networked control systems under denial-of-service attacks[C]//Proc of Int Conf on Hybrid Systems: Computation & Control. Berlin: Springer, 2009
[10] 彭大天, 董建敏, 蔡忠闽, 等. 假数据注入攻击下信息物理融合系统的稳定性研究[J]. 自动化学报, 2019, 45(1):198-207
[11] 叶丹, 王吉言. 多传感器系统的最优线性欺骗攻击设计[J]. 控制与决策, 2019, 34(11):2297-2302
[12] Li Fangfei, Yang Chao, Tang Yang. Optimal linear attack on cyber physical systems with multiplicative noise[J]. IEEE Access, 2018, 6: 33318-33328
[13] Guo Ziyang, Shi Dawei, Johansson K H, et al. Worst-case innovation-based integrity attacks with side information on remote state estimation[J]. IEEE Trans on Control of Network Systems, 2019, 6(1):48-59
[14] Zhao Yinghong, He Xiao , Zhou Donghua. Optimal joint control and triggering strategies against denial of service attacks: A zero-sum game[J]. IET Control Theory & Applications, 2017, 11(14):2352-2360
[15] Feng Shuai, Tesi P. Resilient control under denial-of-service: Robust design[J]. Automatica, 2016, 79:42-51
[16] De Persis C, Tesi P. Input-to-State stabilizing control under denial-of-service[J]. IEEE Trans on Automatic Control, 2015, 60(11):2930-2944
[17] Li Yuzhe, Shi Ling, Chen Tongwen. Detection against linear deception attacks on multi-sensor remote state estimation[J]. IEEE Trans on Control of Network Systems, 2018, 5(3): 846-856
[18] Guo Ziyang, Shi Dawei, Quevedo D E, et al. Secure state estimation against Integrity attacks: A gaussian mixture model approach[J]. IEEE Trans on Signal Processing, 2019, 67(1):194-207
[19] Wen Kun, Yang Jiahai, Zhang Bin. Survey on research and progress of low-rate denial of service attacks[J]. Journal of Software, 2014, 25(3): 591-605
[20] Zhang Heng, Qi Yifei, Wu Junfeng, et al. DoS attack energy management sgainst remote state estimation[J]. IEEE Trans on Control of Network Systems, 2018, 5(1):383-394
[21] 温景容, 武穆清, 宿景芳. 信息物理融合系统[J]. 自动化学报, 2012, 38(4): 507-517
|