[1]
|
Lee J, Bagheri B, Kao H A. A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufacturing Letters, 2015, 3:18-23 doi: 10.1016/j.mfglet.2014.12.001
|
[2]
|
Mosterman P J, Zander J. Industry 4.0 as a cyber-physical system study. Software and Systems Modeling, 2016, 15(1):17-29 doi: 10.1007/s10270-015-0493-x
|
[3]
|
邓建玲, 王飞跃, 陈耀斌, 赵向阳.从工业4.0到能源5.0:智能能源系统的概念、内涵及体系框架.自动化学报, 2015, 41(12):2003-2016 http://www.aas.net.cn/CN/abstract/abstract18774.shtmlDeng Jian-Ling, Wang Fei-Yue, Chen Yao-Bin, Zhao Xiang-Yang. From Industries 4.0 to Energy 5.0:concept and framework of intelligent energy systems. Acta Automatica Sinica, 2015, 41(12):2003-2016 http://www.aas.net.cn/CN/abstract/abstract18774.shtml
|
[4]
|
王飞跃, 张俊.智联网:概念、问题和平台.自动化学报, 2017, 43(12):2061-2070 http://www.aas.net.cn/CN/abstract/abstract19181.shtmlWang Fei-Yue, Zhang Jun. Internet of minds:the concept, issues and platforms. Acta Automatica Sinica, 2017, 43(12):2061-2070 http://www.aas.net.cn/CN/abstract/abstract19181.shtml
|
[5]
|
白天翔, 王帅, 沈震, 曹东璞, 郑南宁, 王飞跃.平行机器人与平行无人系统:框架、结构、过程、平台及其应用.自动化学报, 2017, 43(2):161-175 http://d.old.wanfangdata.com.cn/Periodical/zdhxb201702001Bai Tian-Xiang, Wang Shuai, Shen Zhen, Cao Dong-Pu, Zheng Nan-Ning, Wang Fei-Yue. Parallel robotics and parallel unmanned systems:framework, structure, process, platform and applications. Acta Automatica Sinica, 2017, 43(2):161-175 http://d.old.wanfangdata.com.cn/Periodical/zdhxb201702001
|
[6]
|
王飞跃, 孙奇, 江国进, 谭珂, 张俊, 侯家琛, 等.核能5.0:智能时代的核电工业新形态与体系架构.自动化学报, 2018, 44(5):922934 http://www.aas.net.cn/CN/abstract/abstract19283.shtmlWang Fei-Yue, Sun Qi, Jiang Guo-Jin, Tan Ke, Zhang Jun, Hou Jia-Chen, et al. Nuclear energy 5.0:new formation and system architecture of nuclear power industry in the new IT era. Acta Automatica Sinica, 2018, 44(5):922-934 http://www.aas.net.cn/CN/abstract/abstract19283.shtml
|
[7]
|
Alguliyev R, Imamverdiyev Y, Sukhostat L. Cyber-physical systems and their security issues. Computers in Industry, 2018, 100:212-223 doi: 10.1016/j.compind.2018.04.017
|
[8]
|
Sandberg H, Amin S, Johansson K H. Cyberphysical security in networked control systems:an introduction to the issue. IEEE Control Systems, 2015, 35(1):20-23 http://openurl.ebscohost.com/linksvc/linking.aspx?stitle=IEEE%20Control%20Systems&volume=35&issue=1&spage=20
|
[9]
|
Zargar S T, Joshi J, Tipper D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 2013, 15(4):2046-2069 doi: 10.1109/SURV.2013.031413.00127
|
[10]
|
Mölsä J. Mitigating denial of service attacks:a tutorial. Journal of Computer Security, 2005, 13(6):807-837 doi: 10.3233/JCS-2005-13601
|
[11]
|
Weerakkody S, Mo Y L, Sinopoli B. Detecting integrity attacks on control systems using robust physical watermarking. In: Proceedings of the 53rd IEEE Annual Conference on Decision and Control. Los Angeles, USA: IEEE, 2014. 3757-3764
|
[12]
|
Miao F, Pajic M, Pappas G J. Stochastic game approach for replay attack detection. In: Proceedings of the 52nd IEEE Annual Conference on Decision and Control. Florence, Italy: IEEE, 2013. 1854-1859
|
[13]
|
Ehrenfeld J M. WannaCry, cybersecurity and health information technology:a time to act. Journal of Medical Systems, 2017, 41(7):104 doi: 10.1007/s10916-017-0752-1
|
[14]
|
Mohurle S, Patil M. A brief study of wannaCry threat:ransomware attack 2017. International Journal of Advanced Research in Computer Science, 2017, 8(5):1938-1940
|
[15]
|
Langner R. Stuxnet:dissecting a cyberwarfare weapon. IEEE Security and Privacy, 2011, 9(3):49-51 http://d.old.wanfangdata.com.cn/Periodical/sysyjyts201408030
|
[16]
|
McLaughlin S, Konstantinou C, Wang X Y, Davi L, Sadeghi A R, Maniatakos M, et al. The cybersecurity landscape in industrial control systems. Proceedings of the IEEE, 2016, 104(5):1039-1057 doi: 10.1109/JPROC.2015.2512235
|
[17]
|
Khorrami F, Krishnamurthy P, Karri R. Cybersecurity for control systems:a process-aware perspective. IEEE Design and Test, 2016, 33(5):75-83 doi: 10.1109/MDAT.2016.2594178
|
[18]
|
Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security, 2011, 14(1): Article No. 13
|
[19]
|
Kwon C, Liu W Y, Hwang I. Security analysis for cyber-physical systems against stealthy deception attacks. In: Proceedings of the 2013 American Control Conference. Washington DC, USA: IEEE, 2013, 3344-3349
|
[20]
|
Smith R S. Covert misappropriation of networked control systems:presenting a feedback structure. IEEE Control Systems, 2015, 35(1):82-92
|
[21]
|
Mo Y L, Sinopoli B. On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 2016, 61(9):2618-2624 doi: 10.1109/TAC.2015.2498708
|
[22]
|
Pang Z H, Liu G P, Zhou D H, Hou F Y, Sun D H. Two-channel false data injection attacks against output tracking control of networked systems. IEEE Transactions on Industrial Electronics, 2016, 63(5):3242-3251 doi: 10.1109/TIE.2016.2535119
|
[23]
|
Miao F, Zhu Q Y, Pajic M, Pappas G J. Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Transactions on Control of Network Systems, 2017, 4(1):106-117 doi: 10.1109/TCNS.2016.2573039
|
[24]
|
Zhang R, Venkitasubramaniam P. Stealthy control signal attacks in linear quadratic gaussian control systems:detectability reward tradeoff. IEEE Transactions on Information Forensics and Security, 2017, 12(7):1555-1570 doi: 10.1109/TIFS.2017.2668220
|
[25]
|
Liu X, Li Z Y, Shuai Z K, Wen Y F. Cyber attacks against the economic operation of power systems:a fast solution. IEEE Transactions on Smart Grid, 2017, 8(2):1023-1025 http://ieeexplore.ieee.org/document/7731227/
|
[26]
|
Liu C S, Zhou M, Wu J, Long C N, Kundur D. Financially motivated FDI on SCED in real-time electricity markets: attacks and mitigation. IEEE Transactions on Smart Grid, DOI: 10.1109/TSG.2017.2784366,2017.
|
[27]
|
Peng D T, Dong J M, Jian J N, Peng Q K, Zeng B, Mao Z H. Economic-Driven FDI Attack in Electricity Market. In: International Conference on Science of Cyber Security. Beijing, China: Springer, 2018. 216-224
|
[28]
|
Liang G Q, Zhao J H, Luo F J, Weller S R, Dong Z Y. A review of false data injection attacks against modern power systems. IEEE Transactions on Smart Grid, 2017, 8(4):1630-1638 doi: 10.1109/TSG.2015.2495133
|
[29]
|
Liang G Q, Weller S R, Zhao J H, Luo F J, Dong Z Y. The 2015 Ukraine blackout:implications for false data injection attacks. IEEE Transactions on Power Systems, 2017, 32(4):3317-3318 doi: 10.1109/TPWRS.2016.2631891
|