[1]
|
Derler P, Lee E A, Vincentelli A S. Modeling cyber-physical systems. Proceedings of the IEEE, 2012, 100(1): 13−28 doi: 10.1109/JPROC.2011.2160929
|
[2]
|
李洪阳, 魏慕恒, 黄洁, 邱伯华, 赵晔, 骆文城, 等. 信息物理系统技术综述. 自动化学报, 2019, 45(1): 37−50 doi: 10.16383/j.aas.2018.c180362Li Hong-Yang, Wei Mu-Heng, Huang Jie, Qiu Bo-Hua, Zhao Ye, Luo Wen-Cheng, et al. Review of information physical systems technology. Acta Automatica Sinica, 2019, 45(1): 37−50 doi: 10.16383/j.aas.2018.c180362
|
[3]
|
Kim S, Park K J, Lu C Y. A survey on network security for cyber-physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials, 2022, 24(3): 1534−1573
|
[4]
|
刘烃, 田决, 王稼舟, 吴宏宇, 孙利民, 周亚东, 等. 信息物理融合系统综合安全威胁与防御研究. 自动化学报, 2019, 45(1): 5−24Liu Ting, Tian Jue, Wang Jia-Zhou, Wu Hong-Yu, Sun Li-Min, Zhou Ya-Dong, et al. Research on integrated security threat and defense of information physical fusion system. Acta Automatica Sinica, 2019, 45(1): 5−24
|
[5]
|
Duo W L, Zhou M C, Abusorrah A, Valente J, Faisal M, Ruths J, et al. A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA Journal of Automatica Sinica, 2022, 9(5): 784−800 doi: 10.1109/JAS.2022.105548
|
[6]
|
Giraldo J, Urbina D, Cardenas A. A survey of physics-based attack detection in cyber-physical systems. ACM Computing Surveys, 2018, 51(4): Article No. 76
|
[7]
|
Tan S, Guerrero J M, Xie P L, Han R K, Vasquez J C. Brief survey on attack detection methods for cyber-physical systems. IEEE Systems Journal, 2020, 14(4): 5329−5339 doi: 10.1109/JSYST.2020.2991258
|
[8]
|
杨超群, 张恒. 基于CBMeMBer滤波器的多攻击检测方法. 控制工程, 2022, 29(6): 1033−1039Yang Chao-Qun, Zhang Heng. Multi-attack detection approach based on CBMeMBer filt. Control Engineering of China, 2022, 29(6): 1033−1039
|
[9]
|
穆超, 王鑫, 杨明, 张恒, 陈振娅, 吴晓明. 面向物联网设备固件的硬编码漏洞检测方法. 网络与信息安全学报, 2022, 8(5): 98−110Mu Chao, Wang Xin, Yang Ming, Zhang Heng, Chen Zhen-Ya, Wu Xiao-Ming. Hard-coded vulnerability detection approach for IoT device firmware. Chinese Journal of Network and Information, 2022, 8(5): 98−110
|
[10]
|
Zhang Q R, Liu K, Teixeira A, Li Y Z, Chai S C, Xia Y Q. An online Kullback-Leibler divergence-based stealthy attack against cyber-physical systems. IEEE Transactions on Automatic Control, 2022, 68(6): 3672−3679 doi: 10.1109/TAC.2022.3192201
|
[11]
|
Zhang Q R, Liu K, Xia Y Q, Ma A Y. Optimal stealthy deception attack against cyber-physical systems. IEEE Transactions on Cybernetics, 2020, 50(9): 3963−3972 doi: 10.1109/TCYB.2019.2912622
|
[12]
|
Zhang Q R, Liu K, Han D Y, Su G Z, Xia Y Q. Design of stealthy deception attacks with partial system knowledge. IEEE Transactions on Automatic Control, 2023, 68(2): 1069−1076 doi: 10.1109/TAC.2022.3146079
|
[13]
|
Guo Z Y, Shi D W, Johansson K H, Shi L. Worst-case stealthy innovation-based linear attack on remote state estimation. Automatica, 2018, 89: 117−124 doi: 10.1016/j.automatica.2017.11.018
|
[14]
|
Mo Y L, Sinopoli B. False data injection attacks in control systems. In: Proceedings of the 1st Workshop on Secure Control Systems. Stockholm, Sweden: IEEE, 2010. 1−6
|
[15]
|
Kwon C, Liu W Y, Hwang I. Analysis and design of stealthy cyber attacks on unmanned aerial systems. Journal of Aerospace Information Systems, 2014, 11(8): 525−539 doi: 10.2514/1.I010201
|
[16]
|
Sui T J, Mo Y L, Marelli D, Sun X M, Fu M Y. The vulnerability of cyber-physical system under stealthy attacks. IEEE Transactions on Automatic Control, 2020, 66(2): 637−650
|
[17]
|
Sui T J, Sun X M. The vulnerability of distributed state estimator under stealthy attacks. Automatica, 2021, 133: Article No. 109869 doi: 10.1016/j.automatica.2021.109869
|
[18]
|
Hu L, Wang Z D, Han Q L, Liu X H. State estimation under false data injection attacks: Security analysis and system protection. Automatica, 2018, 87: 176−183 doi: 10.1016/j.automatica.2017.09.028
|
[19]
|
Xu W Y, Wang Z D, Hu L, Kurths J. State estimation under joint false data injection attacks: Dealing with constraints and insecurity. IEEE Transactions on Automatic Control, 2022, 62 (2): 6745−6753
|
[20]
|
Jovanov I, Pajic M. Relaxing integrity requirements for attack-resilient cyber-physical systems. IEEE Transactions on Automa-tic Control, 2019, 64(12): 4843−4858 doi: 10.1109/TAC.2019.2898510
|
[21]
|
Zhang T Y, Ye D. False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach. Automatica, 2020, 120: Article No. 109117 doi: 10.1016/j.automatica.2020.109117
|
[22]
|
Mo Y L, Sinopoli B. On the performance degradation of cyber-physical systems under stealthy integrity attacks. IEEE Transactions on Automatic Control, 2015, 61(9): 2618−2624
|
[23]
|
Murguia C, Shames I, Ruths J. Security metrics and synthesis of secure control systems. Automatica, 2020, 115: Article No. 108757 doi: 10.1016/j.automatica.2019.108757
|
[24]
|
Kwon C, Hwang I. Reachability analysis for safety assurance of cyber-physical systems against cyber attacks. IEEE Transactions on Automatic Control, 2018, 63(7): 2272−2279 doi: 10.1109/TAC.2017.2761762
|
[25]
|
Liu H, Niu B, Qin J H. Reachability analysis for linear discrete-time systems under stealthy cyber attacks. IEEE Transactions on Automatic Control, 2021, 66(9): 4444−4451 doi: 10.1109/TAC.2021.3050549
|
[26]
|
Zhang Q R, Liu K, Pang Z H, Xia Y Q, Liu T. Reachability analysis of cyber-physical systems under stealthy attacks. IEEE Transactions on Cybernetics, 2022, 52(6): 4926−4934 doi: 10.1109/TCYB.2020.3025307
|
[27]
|
Hashemi N, Ruths J. Co-design for resilience and performance. IEEE Transactions on Control of Network Systems, 2022, 10(3): 1387−1399 doi: 10.1109/TCNS.2022.3229774
|
[28]
|
Bai C Z, Pasqualetti F, Gupta V. Data-injection attacks in stochastic control systems: Detectability and performance trade-offs. Automatica, 2017, 82: 251−260 doi: 10.1016/j.automatica.2017.04.047
|
[29]
|
Fang C R, Qi Y F, Chen J M, Tan R, Zheng W X. Stealthy actuator signal attacks in stochastic control systems: Performance and limitations. IEEE Transactions on Automatic Control, 2020, 65(9): 3927−3934 doi: 10.1109/TAC.2019.2950072
|
[30]
|
Kullback S. Information Theory and Statistics. Chelmsford: Courier Corporation, 1997.
|
[31]
|
Boyd S, El Ghaoui L, Feron E, Balakrishnan V. Linear Matrix Inequalities in System and Control Theory. Philadelphia: Society for Industry and Applied Mathematics, 1994.
|
[32]
|
Diananda P H. A simple proof of the arithmetic mean geometric mean inequality. The American Mathematical Monthly, 1960, 67(10): Article No. 1007 doi: 10.2307/2309236
|
[33]
|
夏元清. 云控制系统及其面临的挑战. 自动化学报, 2016, 42(1): 1−12Xia Yuan-Qing. Cloud control systems and their challenges. Acta Automatica Sinica, 2016, 42(1): 1−12
|