Abstract is missing.
- Consensus of multi-agent networks in the presence of adversaries using only local informationHeath LeBlanc, Haotian Zhang, Shreyas Sundaram, Xenofon D. Koutsoukos. 1-10 [doi]
- HMM-based characterization of channel behavior for networked control systemsJian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Shreyas Sundaram, George J. Pappas, Insup Lee. 11-20 [doi]
- Coordinated variable structure switching in smart power systems: attacks and mitigationShan Liu, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry. 21-30 [doi]
- Leader selection games under link noise injection attacksAndrew Clark, Linda Bushnell, Radha Poovendran. 31-40 [doi]
- A dynamic game-theoretic approach to resilient control system design for cascading failuresQuanyan Zhu, Tamer Basar. 41-46 [doi]
- Integrity attacks on cyber-physical systemsYilin Mo, Bruno Sinopoli. 47-54 [doi]
- Attack models and scenarios for networked control systemsAndré Teixeira, Daniel Pérez, Henrik Sandberg, Karl Henrik Johansson. 55-64 [doi]
- Distributed detection and isolation of topology attacks in power networksJames Weimer, Soummya Kar, Karl Henrik Johansson. 65-72 [doi]
- NCS security experimentation using DETERAlefiya Hussain, Saurabh Amin. 73-80 [doi]
- Integrated simulation and emulation platform for cyber-physical system security experimentationWei Yan, Yuan Xue, Xiaowei Li 0003, Jiannian Weng, Timothy Busch, Janos Sztipanovits. 81-88 [doi]