References
- Amin, S., X. Litrico, S. Sastry, and A. M. Bayen. 2013. “Cyber Security of Water SCADA Systems -- Part I: Analysis and Experimentation of Stealthy Deception Attacks.” IEEE Transactions on Control Systems Technology 21 (5): 1963–1970.
- Amin, S., G. A. Schwartz, and S. S. Sastry. 2013. “Security of Interdependent and Identical Networked Control Systems.” Automatica 49 (1): 186–192.
- Befekadu, G. K., V. Gupta, and P. J. Antsaklis. 2011. “Risk-sensitive Control under a Class of Denial-of-Service Attack Models.” In Proceedings of the 2011 American Control Conference, San Francisco, CA, June 29--July 1, 643–648. San Francisco, CA: IEEE.
- Cárdenas, A. A., S. Amin, and S. S. Sastry. 2008. “Secure Control: Towards Survivable Cyber-physical Systems.” In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, June 17--20, 495–500. Beijing: IEEE.
- Clark, A., L. Bushnell, and R. Poovendran. 2012. “A Passivity-based Framework for Composing Attacks on Networked Control Systems.” In Proceedings of the 50th Annual Allerton Conference, Monticello, IL, October 1--5, 1814–1821. Monticello, ML: IEEE.
- Dong, H., Z. Wang, S. X. Ding, and H. Gao. 2014. “Finite-horizon Estimation of Randomly Occurring Faults for a Class of Nonlinear Time-varying Systems.” Automatica 50 (12): 3182–3189.
- Foroush, H., and S. Martínez. 2012. “On Event-triggered Control of Linear Systems under Periodic Denial-of-Service Jamming Attacks.” In Proceedings of the 2012 IEEE 51st Annual Conference on Decision and Control, Maui, HI, December 10--13, 2551–2256. Maui, HI: IEEE.
- Hu, J., Z. Wang, B. Shen, and H. Gao. 2013. “Quantised Recursive Filtering for a Class of Nonlinear Systems with Multiplicative Noises and Missing Measurements.” International Journal of Control 86 (4): 650–663.
- Jacobson, D. 1974. “A General Result in Stochastic Optimal Control of Nonlinear Discrete-time Systems with Quadratic Performance Criteria.” Journal of Mathematical Analysis and Applications 47 (1): 153–161.
- Kalman, R. E. 1960. “A New Approach to Linear Filtering and Prediction Problems.” Transactions of the ASME--Journal of Basic Engineering 82: 35–45.
- Long, M., C.-H. Wu, and J. Y. Hung. 2005. “Denial of Service Attacks on Network-based Control Systems: Impact and Mitigation.” IEEE Transactions on Industrial Informatics 1 (2): 85–96.
- Pang, Z.-H., and G.-P. Liu. 2012. “Design and Implementation of Secure Networked Predictive Control Systems under Deception Attacks.” IEEE Transactions on Control Systems Technology 20 (5): 1334–1342.
- Shen, B., Z. Wang, H. Shu, and G. Wei. 2008. “On Nonlinear H∞ Filtering for Discrete-time Stochastic Systems with Missing Measurements.” IEEE Transactions on Automatic Control 53 (9): 2170–2180.
- Teixeira, A., H. Sandberg, and K. H. Johansson. 2010. “Networked Control Systems under Cyber Attacks with Applications to Power Networks.” In Proceedings of the 2010 American Control Conference, Baltimore, MD, June 30--July 2, 3690–3696. Baltimore, MD: IEEE.
- Theodor, Y., and U. Shaked. 1996. “Robust Discrete-time Minimum-variance Filtering.” IEEE Transactions on Singnal Processing 44 (2): 181–189.
- Yaz, E., and Y. Yaz. 2001. “State Estimation of Uncertain Nonlinear Stochastic Systems with General Criteria.” Applied Mathematics Letters 14 (5): 605–610.