1

Secure Estimation in the Presence of Integrity Attacks

Year:
2015
Language:
english
File:
PDF, 174 KB
english, 2015
8

Integrity Data Attacks in Power Market Operations

Year:
2011
Language:
english
File:
PDF, 523 KB
english, 2011
14

Detection in Adversarial Environments

Year:
2014
Language:
english
File:
PDF, 562 KB
english, 2014
15

Kalman Filtering with Intermittent Observations: Critical Value for Second Order System

Year:
2011
Language:
english
File:
PDF, 204 KB
english, 2011
20

Sensor scheduling over a packet-delaying network

Year:
2011
Language:
english
File:
PDF, 258 KB
english, 2011
28

Resilient Detection in the Presence of Integrity Attacks

Year:
2014
Language:
english
File:
PDF, 3.31 MB
english, 2014
46

Privacy Preserving Average Consensus

Year:
2016
Language:
english
File:
PDF, 857 KB
english, 2016
48

Network Energy Minimization via Sensor Selection and Topology Control*

Year:
2009
Language:
english
File:
PDF, 446 KB
english, 2009
49

Detecting Integrity Attacks on SCADA Systems

Year:
2011
Language:
english
File:
PDF, 393 KB
english, 2011