References
- M. Bhrugubanda, "A Review on Applications of Cyber Physical Systems," Journal of Innovative Research in Science, Engineering and Technology, Vol. 2, No. 6, pp. 728-730, 2015.
- Y.S. Eun, K.J. Park, M.G. Won, T.J. Park, S.H. Son, "Recent Trends in Cyber-Physical Systems Research," Journal of Communications of the Korea Institute of Information Scientists and Engineers, Vol. 30, No. 12, pp. 8-15, 2013 (in Korean).
- J. Slay, M. Miller, "Lessons Learned From the Maroochy Water Breach," Journal of Critical Infrastructure Protection, Vol. 253, pp. 73-82, 2007. https://doi.org/10.1007/978-0-387-75462-8_6
- Avaliable on : https://www.computerworld.com/article/2515570
- Avaliable on : https://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/
- A. Cardenas, S. Amin, S. Sastry, "Research Challenges for the Security of Control Systems," Proceedings of 3rd Conference Hot Topics Security, pp. 1-6, 2008.
- A. Teixeira, D. Perez, H. Sandberg, K.H. Johansson, "Attack Models and Scenarios for Networked Control System," Proceedings of 1st Conference High Confidence Networked Systems, pp. 55-64, 2012.
- Y.Z. Lum, A. D'Innocenzo, F. Smarra, I. Malavolta, M.D. Di Bendetto, "State of the Art of Cyber-physical Systems Security: An Automatic Control Perspective," Journal of System Software, Vol. 149, pp. 174-216, 2019. https://doi.org/10.1016/j.jss.2018.12.006
- H. Shisheh foroush, S. Martinez, "On Multi-input Controllable Linear Systems Under Unknown Periodic dos Jamming Attacks," Proceedings of SIAM Conference Control and its Applications, 2013.
- M. Zhu, S. Martinez, "Stackelberg-game Analysis systems," Proceedings of American Control Conference, pp. 4063-4068, 2011.
- C. Won, I. Hwang, "Analytical Analysis of Cyber Attacks on Unmanned Aerial Systems," Proceedings of AIAA Conference on Guidance Navigation and Control, 2013.
- S.M. Djouadi, A.M. Melin, E.M. Ferragut, J.A. Laska, J. Dong, "Finite Energy and Bounded Attacks on Control System Sensor Signals," Proceedings of American Control Conference (ACC), pp. 1716-1722, 2014.
- W. Ao, Y.D. Song, C.Y. Wen, "Adaptive Cyber-physical System Attack Detection and Reconstruction With Application to Power System," Journal of lET Control Theory and Applications, Vol. 10, No. 12, pp. 1458-1468, 2016. https://doi.org/10.1049/iet-cta.2015.1147
- M. Darouach, M. Zasadzinski, A.B. Onana, S. Nowakowski, "Kalman Filtering With Unknown Inputs via Optimal State Estimation of Singular Systems," Journal of Systems Science, Vol. 26, No. 10, pp. 2015-2028, 1995. https://doi.org/10.1080/00207729508929152
- H. Fawzi, P. Tabuada, S. Diggavi, "Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks," Journal of IEEE Transactions on Automatic Control, Vol. 59, No. 6, pp. 1454-1467, 2014. https://doi.org/10.1109/TAC.2014.2303233
- R. Rajamani, Vehicle Dynamics and Control, New York, Sringer-Verlag, 2005.