Aerospace and Electronic Systems Magazine May 2017 - 44

Security of SCADA Systems against Cyber-Physical Attacks
[66]

[67]

[68]

[69]

[70]

[71]

[72]

[73]

[74]

[75]
[76]

[77]

[78]

[79]

[80]

[81]

[82]

44

Amin, S., Cardenas, A., and Sastry, S. Safe and secure networked control systems under denial-of-service attacks. Hybrid Systems: Computation and Control, 2009, 31-45.
Sinopoli, B., Schenato, L., Franceschetti, M., Poolla, K., Jordan,
M. I., and Sastry, S. S. Kalman filtering with intermittent observations. IEEE Transactions on Automatic Control, Vol. 49, 9 (2004),
1453-1464.
Schenato, L., Sinopoli, B., Franceschetti, M., Poolla, K., and Sastry,
S. S. Foundations of control and estimation over lossy networks. Proceedings of the IEEE, Vol. 95, 1 (2007), 163-187.
Huang, Y., Cárdenas, A., Amin, S., Lin, Z., Tsai, H., and Sastry, S.
Understanding the physical and economic consequences of attacks on
control systems. International Journal of Critical Infrastructure Protection, Vol. 2, 3 (2009), 73-83.
Hespanha, J. P., Naghshtabrizi, P., and Xu, Y. A survey of recent results in networked control systems. Proceedings of the IEEE, Vol. 95,
1 (2007), 138.
Mo, Y., and Sinopoli, B. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communication,
Control, and Computing, IEEE, 2009, 911-918.
Mo, Y., Garone, E., Casavola, A., and Sinopoli, B. False data injection attacks against state estimation in wireless sensor networks. In
Proceedings of the 49th IEEE Conference on Decision and Control
(CDC), 2010, 5967-5972.
Pasqualetti, F. Secure control systems: a control-theoretic approach to
cyber-physical security. Ph.D. dissertation, University of California,
2012.
Keller, J.-Y., and Sauter, D. Monitoring of stealthy attack in networked control systems. In Proceedings of the 2013 Conference on
Control and Fault-Tolerant Systems (SysTol), IEEE, 2013, 462-467.
Bishop, M. Introduction to Computer Security. Addison-Wesley Professional, 2004.
U.S. Department of Energy. 21 steps to improve cyber security of
SCADA networks. Office of Energy Assurance, U.S. Department of
Energy, 2002.
Centre for the Protection of National Infrastructure. Good practice
guide, process control and SCADA security. Centre for the Protection
of National Infrastructure (CPNI), 2005.
Zhu, B., and Sastry, S. SCADA-specific intrusion detection/prevention systems: A survey and taxonomy. In Proceedings of the 1st Workshop on Secure Control Systems (SCS), 2010.
Tartakovsky, A. G., Rozovskii, B. L., Blazek, R. B., and Kim, H. A
novel approach to detection of intrusions in computer networks via
adaptive sequential and batch-sequential change-point detection
methods. IEEE Transactions on Signal Processing, Vol. 54, 9 (2006),
3372-3382.
Tartakovsky, A., Nikiforov, I., and Basseville, M. Sequential Analysis: Hypothesis Testing and Changepoint Detection (Chapman &
Hall/CRC Monographs on Statistics & Applied Probability). Taylor & Francis, 2014. [Online]. Available: http://books.google.fr/
books?id=zhsbBAAAQBAJ
Falliere, N. Exploring Stuxnet's PLC infection process, http://www.
symantec.com/connect/blogs/ exploring-stuxnet-s-plc-infection-process Sept. 22, 2010.
Cardenas, A. A., Amin, S., and Sastry, S. Secure control: Towards
survivable cyber-physical systems. In Proceedings of the 28th Inter-

[83]
[84]
[85]
[86]
[87]

[88]

[89]
[90]

[91]

[92]
[93]

[94]

[95]

[96]
[97]

[98]
[99]

[100]

[101]

[102]

IEEE A&E SYSTEMS MAGAZINE

national Conference on Distributed Computing Systems Workshops,
IEEE, 2008, 495-500.
Von Luxburg, U., and Schölkopf, B. Statistical learning theory: models, concepts, and results. arXiv:0810.4752, 2008.
Bishop, C. M. Pattern Recognition and Machine Learning. Springer,
2006.
Shawe-Taylor, J., and Cristianini, N. Kernel Methods for Pattern
Analysis. Cambridge University Press, 2004.
Hofmann, T., Schölkopf, B., and Smola, A. J. Kernel methods in machine learning. Annals of Statistics, 2008, 1171-1220.
Nader, P. One-class classification for cyber intrusion detection in
industrial systems. Ph.D. dissertation, University of Technology of
Troyes, France, 2015.
Schölkopf, B., Burges, C. J., and Smola, A. J. Introduction to support
vector learning. In Advances in Kernel Methods. MIT Press, 1999,
1-15.
Tax, D. M., and Duin, R. P. Support vector data description. Machine
Learning, Vol. 54, 1 (2004), 45-66.
Khan, S. S., and Madden, M. G. A survey of recent trends in one class
classification. In Artificial Intelligence and Cognitive Science. Springer, 2010, 188-197.
Nader, P., Honeine, P., and Beauseroy, P. lp-norms in one-class classification for intrusion detection in SCADA systems. IEEE Transactions
on Industrial Informatics, Vol. 10, 4 (2014), 2308-2317.
Aly, M. Survey on multiclass classification methods. Neural Network,
2005, 1-9.
Mathur, A., and Foody, G. Multiclass and binary svm classification:
implications for training and classification users. IEEE Geoscience
and Remote Sensing Letters, Vol. 5, 2 (2008), 241-245.
Beaver, J. M., Borges-Hink, R. C., and Buckner, M. A. An evaluation
of machine learning methods to detect malicious SCADA communications. In Proceedings of the 12th International Conference on Machine Learning and Applications (ICMLA'13), Vol. 2. Washington,
DC: IEEE Computer Society, 2013, 54-59.
Junejo, K. N., and Yau, D. Data driven physical modelling for intrusion detection in cyber physical systems. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC), Vol. 14, 2016, 43-57.
Chen, J., and Patton, R. J. Robust Model-Based Fault Diagnosis for
Dynamic Systems. Kluwer Academic Publishers, 1999.
Hwang, I., Kim, S., Kim, Y., and Seah, C. E. A survey of fault detection, isolation, and reconfiguration methods. IEEE Transactions on
Control Systems Technology, Vol. 18, 3 (2010), 636-653.
Isermann, R. Fault-Diagnosis Systems: an Introduction from Fault
Detection to Fault Tolerance. Springer, 2006.
Basseville, M., and Nikiforov, I. V. Detection of Abrupt Changes:
Theory and Application (Information and System Sciences Series).
Englewood Cliffs, NJ: Prentice Hall, 1993.
Frank, P. M., and Ding, X. Survey of robust residual generation and
evaluation methods in observer-based fault detection systems. Journal
of Process Control, Vol. 7, 6 (1997), 403-424.
Valcher, M. E. State observers for discrete-time linear systems with
unknown inputs. IEEE Transactions on Automatic Control, Vol. 44,
2 (1999), 397-401.
Willsky, A., and Jones, H. A generalized likelihood ratio approach to
the detection and estimation of jumps in linear systems. IEEE Transactions on Automatic Control, Vol. 21, 1 (1976), 108-112.

MAY 2017


http://books.google.fr/books?id=zhsbBAAAQBAJ http://books.google.fr/books?id=zhsbBAAAQBAJ http://www.symantec.com/connect/blogs/ http://www.symantec.com/connect/blogs/

Table of Contents for the Digital Edition of Aerospace and Electronic Systems Magazine May 2017

No label
Aerospace and Electronic Systems Magazine May 2017 - No label
Aerospace and Electronic Systems Magazine May 2017 - Cover2
Aerospace and Electronic Systems Magazine May 2017 - 1
Aerospace and Electronic Systems Magazine May 2017 - 2
Aerospace and Electronic Systems Magazine May 2017 - 3
Aerospace and Electronic Systems Magazine May 2017 - 4
Aerospace and Electronic Systems Magazine May 2017 - 5
Aerospace and Electronic Systems Magazine May 2017 - 6
Aerospace and Electronic Systems Magazine May 2017 - 7
Aerospace and Electronic Systems Magazine May 2017 - 8
Aerospace and Electronic Systems Magazine May 2017 - 9
Aerospace and Electronic Systems Magazine May 2017 - 10
Aerospace and Electronic Systems Magazine May 2017 - 11
Aerospace and Electronic Systems Magazine May 2017 - 12
Aerospace and Electronic Systems Magazine May 2017 - 13
Aerospace and Electronic Systems Magazine May 2017 - 14
Aerospace and Electronic Systems Magazine May 2017 - 15
Aerospace and Electronic Systems Magazine May 2017 - 16
Aerospace and Electronic Systems Magazine May 2017 - 17
Aerospace and Electronic Systems Magazine May 2017 - 18
Aerospace and Electronic Systems Magazine May 2017 - 19
Aerospace and Electronic Systems Magazine May 2017 - 20
Aerospace and Electronic Systems Magazine May 2017 - 21
Aerospace and Electronic Systems Magazine May 2017 - 22
Aerospace and Electronic Systems Magazine May 2017 - 23
Aerospace and Electronic Systems Magazine May 2017 - 24
Aerospace and Electronic Systems Magazine May 2017 - 25
Aerospace and Electronic Systems Magazine May 2017 - 26
Aerospace and Electronic Systems Magazine May 2017 - 27
Aerospace and Electronic Systems Magazine May 2017 - 28
Aerospace and Electronic Systems Magazine May 2017 - 29
Aerospace and Electronic Systems Magazine May 2017 - 30
Aerospace and Electronic Systems Magazine May 2017 - 31
Aerospace and Electronic Systems Magazine May 2017 - 32
Aerospace and Electronic Systems Magazine May 2017 - 33
Aerospace and Electronic Systems Magazine May 2017 - 34
Aerospace and Electronic Systems Magazine May 2017 - 35
Aerospace and Electronic Systems Magazine May 2017 - 36
Aerospace and Electronic Systems Magazine May 2017 - 37
Aerospace and Electronic Systems Magazine May 2017 - 38
Aerospace and Electronic Systems Magazine May 2017 - 39
Aerospace and Electronic Systems Magazine May 2017 - 40
Aerospace and Electronic Systems Magazine May 2017 - 41
Aerospace and Electronic Systems Magazine May 2017 - 42
Aerospace and Electronic Systems Magazine May 2017 - 43
Aerospace and Electronic Systems Magazine May 2017 - 44
Aerospace and Electronic Systems Magazine May 2017 - 45
Aerospace and Electronic Systems Magazine May 2017 - 46
Aerospace and Electronic Systems Magazine May 2017 - 47
Aerospace and Electronic Systems Magazine May 2017 - 48
Aerospace and Electronic Systems Magazine May 2017 - 49
Aerospace and Electronic Systems Magazine May 2017 - 50
Aerospace and Electronic Systems Magazine May 2017 - 51
Aerospace and Electronic Systems Magazine May 2017 - 52
Aerospace and Electronic Systems Magazine May 2017 - 53
Aerospace and Electronic Systems Magazine May 2017 - 54
Aerospace and Electronic Systems Magazine May 2017 - 55
Aerospace and Electronic Systems Magazine May 2017 - 56
Aerospace and Electronic Systems Magazine May 2017 - 57
Aerospace and Electronic Systems Magazine May 2017 - 58
Aerospace and Electronic Systems Magazine May 2017 - 59
Aerospace and Electronic Systems Magazine May 2017 - 60
Aerospace and Electronic Systems Magazine May 2017 - 61
Aerospace and Electronic Systems Magazine May 2017 - 62
Aerospace and Electronic Systems Magazine May 2017 - 63
Aerospace and Electronic Systems Magazine May 2017 - 64
Aerospace and Electronic Systems Magazine May 2017 - Cover3
Aerospace and Electronic Systems Magazine May 2017 - Cover4
http://www.brightcopy.net/allen/aesm/34-2s
http://www.brightcopy.net/allen/aesm/34-2
http://www.brightcopy.net/allen/aesm/34-1
http://www.brightcopy.net/allen/aesm/33-12
http://www.brightcopy.net/allen/aesm/33-11
http://www.brightcopy.net/allen/aesm/33-10
http://www.brightcopy.net/allen/aesm/33-09
http://www.brightcopy.net/allen/aesm/33-8
http://www.brightcopy.net/allen/aesm/33-7
http://www.brightcopy.net/allen/aesm/33-5
http://www.brightcopy.net/allen/aesm/33-4
http://www.brightcopy.net/allen/aesm/33-3
http://www.brightcopy.net/allen/aesm/33-2
http://www.brightcopy.net/allen/aesm/33-1
http://www.brightcopy.net/allen/aesm/32-10
http://www.brightcopy.net/allen/aesm/32-12
http://www.brightcopy.net/allen/aesm/32-9
http://www.brightcopy.net/allen/aesm/32-11
http://www.brightcopy.net/allen/aesm/32-8
http://www.brightcopy.net/allen/aesm/32-7s
http://www.brightcopy.net/allen/aesm/32-7
http://www.brightcopy.net/allen/aesm/32-6
http://www.brightcopy.net/allen/aesm/32-5
http://www.brightcopy.net/allen/aesm/32-4
http://www.brightcopy.net/allen/aesm/32-3
http://www.brightcopy.net/allen/aesm/32-2
http://www.brightcopy.net/allen/aesm/32-1
http://www.brightcopy.net/allen/aesm/31-12
http://www.brightcopy.net/allen/aesm/31-11s
http://www.brightcopy.net/allen/aesm/31-11
http://www.brightcopy.net/allen/aesm/31-10
http://www.brightcopy.net/allen/aesm/31-9
http://www.brightcopy.net/allen/aesm/31-8
http://www.brightcopy.net/allen/aesm/31-7
https://www.nxtbookmedia.com