References
- Amin, S., Litrico, X., Sastry, S. S., & Bayen, A. M. (2013). Cyber security of water scada systems–Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), 1963–1970. https://doi.org/10.1109/TCST.2012.2211873
- Biron, Z. A., Dey, S., & Pisu, P. (2018). Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Transactions on Intelligent Transportation Systems, 19(12), 3893–3902. https://doi.org/10.1109/TITS.2018.2791484
- Ding, D. R., Wei, G. L., Zhang, S. J., Liu, Y. R., & Alsaadi, F. E. (2017). On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors. Neurocomputing, 219, 99–106. https://doi.org/10.1016/j.neucom.2016.09.009
- Fawzi, H., Tabuada, P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467. https://doi.org/10.1109/TAC.2014.2303233
- Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N. O., Sandberg, H., & Candell, R. (2018). A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys (CSUR), 51(4), 1–36. https://doi.org/10.1145/3203245
- Guan, Y., & Ge, X. (2018). Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing over Networks, 4(1), 48–59. https://doi.org/10.1109/TSIPN.6884276
- Guo, Z., Shi, D., Johansson, K. H., & Shi, L. (2018). Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 89, 117–124. https://doi.org/10.1016/j.automatica.2017.11.018
- Hu, L., Wang, Z., Han, Q. L., & Liu, X. (2018). State estimation under false data injection attacks: Security analysis and system protection. Automatica, 87(87), 176–183. https://doi.org/10.1016/j.automatica.2017.09.028
- Hua, Y., Chen, F., Deng, S., Duan, S., & Wang, L. (2020). Secure distributed estimation against false data injection attack. Information Siences, 515, 248–262. https://doi.org/10.1016/j.ins.2019.12.016
- Jun, S. W., & Guang, H. Y. (2019). Data-Driven methods for stealthy attacks on TCP/IP-based networked control systems equipped with attack detectors. IEEE Transactions on Cybernetics, 49(8), 3020–3031. https://doi.org/10.1109/TCYB.2018.2837874
- Khanna, K., Panigrahi, B. K., & Joshi, A. (2017). AI-based approach to identify compromised meters in data integrity attacks on smart grid. IET Generation, Transmission & Distribution, 12(5), 1052–1066. https://doi.org/10.1049/gtd2.v12.5
- Kosut, O., Jia, L., Thomas, R. J., & Lang, T. (2011). Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid, 2(4), 648–658. https://doi.org/10.1109/TSG.2011.2163807
- Kurt, M. N., lmaz, Y. Y., & Wang, X. (2019). Real-time detection of hybrid and stealthy cyber-attacks in smart grid. IEEE Transactions on Information Forensics and Security, 14(2), 498–513. https://doi.org/10.1109/TIFS.2018.2854745
- Liang, G., Weller, S. R., Zhao, J., Luo, F., & Dong, Z. Y. (2017). The 2015 Ukraine blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems, 32(4), 3317–3318. https://doi.org/10.1109/TPWRS.2016.2631891
- Liu, Y., Ning, P., & Reiter, M. K. (2009). False data injection attacks against state estimation in electric power grids. In Proceedings of 16th ACM conference computer and communications security (pp. 21–32).
- Ljung, L. (1996). System identification. In W. Levine (Ed.), The control handbook (pp. 1033–1054). CRC Press.
- Lu, A. Y., & Yang, G. H. (2020). Malicious attacks on state estimation against distributed control systems. IEEE Transactions on Automatic Control, 65(9), 3911–3918. https://doi.org/10.1109/TAC.9
- Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379. https://doi.org/10.1109/TCNS.2014.2357531
- Michelle, S. C., Masashi, W., & Joao, P. H. (2015). Observability of linear systems under adversarial attacks. In Proceedings of the American control conference (ACC'15) (pp. 2439–2444).
- Mo, Y., & Sinopoli, B. (2015). Secure estimation in the presence of integrity attacks. IEEE Transactions on Automatic Control, 60(4), 1145–1151. https://doi.org/10.1109/TAC.2014.2350231
- Mo, Y., & Sinopoli, B. (2016). On the performance degradation of cyberphysical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 61(9), 2618–2624. https://doi.org/10.1109/TAC.2015.2498708
- Mousavinejad, E., Yang, F., Han, Q. L., & Vlacic, L. (2018). A novel cyber attack detection method in networked control systems. IEEE Transactions on Cybernetics, 48(11), 3254–3264. https://doi.org/10.1109/TCYB.2018.2843358
- Ozay, M., Esnaola, I., Vural, F. T. Y., Kulkarni, S. R., & Poor, H. V. (2016). Machine learning methods for attack detection in the smart grid. IEEE Transactions on Neural Networks and Learning Systems, 27(8), 1773–1786. https://doi.org/10.1109/TNNLS.5962385
- Pang, Z. H., Liu, G. P., Zhou, D. H., Hou, F. Y., & Sun, D. H. (2016). Two channel false data injection attacks against output tracking control of networked systems. IEEE Transactions on Industrial Electronics, 63(5), 3242–3251. https://doi.org/10.1109/TIE.2016.2535119
- Robert, M., & Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. ACM Computing Surveys, 46(4), Article Number: 55. https://doi.org/10.1145/2542049
- Sargolzaei, A., Yazdani, K., Abbaspour, A., Crane III, C. D., & Dixon, W. E. (2020). Detection and mitigation of false data injection attacks in networked control systems. IEEE Transactions on Industrial Informatics, 16(6), 4281–4292. https://doi.org/10.1109/TII.9424
- Sinopoli, B., Schenato, L., Franceschetti, M., Poolla, K., Jordan, M. I., & Sastry, S. S. (2004). Kalman filtering with intermittent observations. IEEE Transactions on Automatic Control, 49(9), 1453–1464. https://doi.org/10.1109/TAC.2004.834121
- Sun, K., Esnaola, I., Perlaza, S. M., & Poor, H. V. (2020). Stealth attacks on the smart grid. IEEE Transactions on Smart Grid, 11(2), 1276–1285. https://doi.org/10.1109/TSG.5165411
- Wilson, E. B., & Hilferty, M. M. (1931). The distribution of Chi-square. Proceedings of the National Academy of Sciences, 17(12), 684–688. https://doi.org/10.1073/pnas.17.12.684
- Wolf, M., & Serpanos, D. (2018). Safety and security in cyber-physical systems and Internet-of-Things systems. Proceedings of the IEEE, 106(1), 9–20. https://doi.org/10.1109/JPROC.2017.2781198
- Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62. https://doi.org/10.1109/MC.2002.1039518
- Zhang, Q., Liu, K., Xia, Y., & Ma, A. (2019). Optimal stealthy deception attack against cyber-physical systems. IEEE Transactions on Cybernetics, 50(9), 3963–3972. https://doi.org/10.1109/TCYB.2019.2912622