References
- Alpcan, T., & Basar, T. (2004). A game theoretic analysis of intrusion detection in access control systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (pp. 1568–1573). Atlantis.
- Alpcan, T., & Başar, T. (2010). Network security: A decision and game-theoretic approach. Cambridge: Cambridge University Press.
- Amin, S., Cardenas, A.A., & Sastry, S.S. (2009). Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control (pp. 31–45). Heidelberg: Springer.
- Baillieul, J., & Antsaklis, P.J. (2007). Control and communication challenges in networked real-time systems. Proceedings of the IEEE, 95, 9–28.
- Başar, T., & Bernhard, P. (2008). H∞ optimal control and related minimax design problems: A dynamic game approach. Boston, MA: Birkhauser.
- Carl, G., Kesidis, G., Brooks, R.R., & Rai, S. (2006). Denial-of-service attack-detection techniques. Internet Computing, 10, 82–89.
- Chen, T.M., & Abu-Nimeh. S,. (2011). Lessons from stuxnet. Computer, 44, 91–93.
- Creery, A., & Byres, E.J. (2005). Industrial cyber security for power system and SCADA networks. In Proceedings of the Petroleum and Chemical Industry Conference (pp. 303–309). Denver, CO.
- Dan, G., & Sandberg, H. (2010). Stealth attacks and protection schemes for state estimators in power systems. In Proceedings of the 1st International Conference on Smart Grid Communications (pp. 214–219). Maryland.
- Elbsat, M.N., & Yaz, E.E. (2013). Robust and resilient finite-time bounded control of discrete-time uncertain nonlinear systems. Automatica, 49, 2292–2296.
- Geer, D. (2006). Security of critical control systems sparks concern. Computer, 39, 20–23.
- Greengard, S. (2010). The new face of war. Communications of the ACM, 53, 20–22.
- Huang, Y.L., Cárdenas, A.A., Amin, S., Lin, Z.S., Tsai, H.Y., & Sastry, S.S. (2009). Understanding the physical and economic consequences of attacks on control systems. International Journal of Critical Infrastructure Protection, 2, 73–83.
- Isidori, A., & Astolfi, A. (1992). Disturbance attenuation and H∞ control via measurement feedback in nonlinear systems. IEEE Transactions on Automatic Control, 37, 1283–1293.
- Jiang, L., Yao, W., Wu, Q.H., Wen, J.Y., & Cheng, S.J. (2012). Delay-dependent stability for load frequency control with constant and time-varying delays. IEEE Transactions on Power Systems, 27, 932–941.
- Korzhyk, D., Conitzer, V., & Parr, R. (2010). Complexity of computing optimal stackelberg strategies in security resource allocation games. In Proceedings of the 24th AAAI Conference on Artificial Intelligence (pp. 805–810). Georgia.
- Long, M., Wu, C.H.J., & Hung, J.Y. (2005). Denial of service attacks on network-based control systems: Impact and mitigation. IEEE Transactions on Industrial Informatics, 1, 85–96.
- Mahmoud, M.S. (2004). Resilient linear filtering of uncertain systems. Automatica, 40, 1797–1802.
- Matusitz, J., & Minei, E. (2009). Cyberterrorism: Its effects on health-related infrastructures. Journal of Digital Forensic Practice, 2, 161–171.
- Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In Proceedings of the 47th Annual Allert on Conference on Communication, Control, and Computing (pp. 911–918). Champaign, IL.
- Moon, J., & Basar, T. (2013). Control over TCP-like lossy networks: A dynamic game approach. In Proceedings of the American Control Conference (pp. 1578–1583). Washington, DC.
- Rieger, C.G., Gertman, D.I., & McQueen, M.A. (2009). Resilient control systems: Next generation design research. In Proceedings of the 2nd International Conference on Human System Interactions (pp. 632–636). Catania.
- Tang, Y., Luo, X., Hui, Q., & Chang, R. (2014). Modeling the vulnerability of feedback-control based internet services to low-rate DoS attacks. IEEE Transactions on Information Forensics and Security, 9, 339–353.
- Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). Champaign.
- Yuan, Y., Zhu, Q., Sun, F., Wang, Q., & Başar, T. (2013). Resilient control of cyber-physical systems against Denial-of-Service attacks. In Proceedings of the 6th International Symposium on Resilient Control Systems (pp. 54–59), San Francisco, CA.
- Zeng, W., & Chow, M.Y. (2011). A trade-off model for performance and security in secured networked control systems. In Proceedings of the 20th IEEE International Symposium on Industrial Electronics (pp. 1997–2002). Gdansk.
- Zhu, Q., & Başar, T. (2009). Dynamic policy-based IDS configuration. In Proceedings of the 48th IEEE Conference on Decision and Control (pp. 8600–8605). Shanghai.
- Zhu, Q., & Başar, T. (2011). Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th Decision and Control and European Control Conference (pp. 4066–4071). Florida.
- Zhu, Q., Rieger, C., & Basar, T. (2011). A hierarchical security architecture for cyber-physical systems. In Proceedings of 4th International Symposium on Resilient Control Systems (pp. 15–20). Boise, ID.