Saurabh Amin
Zitiert von
Zitiert von
Secure control: Towards survivable cyber-physical systems
AA Cardenas, S Amin, S Sastry
2008 The 28th International Conference on Distributed Computing Systems …, 2008
Attacks against process control systems: risk assessment, detection, and response
AA Cárdenas, S Amin, ZS Lin, YL Huang, CY Huang, S Sastry
Proceedings of the 6th ACM symposium on information, computer and …, 2011
Research challenges for the security of control systems.
AA Cárdenas, S Amin, S Sastry
HotSec 5 (15), 1158, 2008
Safe and secure networked control systems under denial-of-service attacks
S Amin, AA Cárdenas, SS Sastry
Hybrid Systems: Computation and Control: 12th International Conference, HSCC …, 2009
Challenges for securing cyber physical systems
A Cardenas, S Amin, B Sinopoli, A Giani, A Perrig, S Sastry
Workshop on future directions in cyber-physical systems security 5 (1), 7, 2009
Cyber security analysis of state estimators in electric power systems
A Teixeira, S Amin, H Sandberg, KH Johansson, SS Sastry
49th IEEE conference on decision and control (CDC), 5991-5998, 2010
Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks
S Amin, X Litrico, S Sastry, AM Bayen
IEEE Transactions on Control Systems Technology 21 (5), 1963-1970, 2012
Cyberphysical security in networked control systems: An introduction to the issue
H Sandberg, S Amin, KH Johansson
IEEE Control Systems Magazine 35 (1), 20-23, 2015
Security of interdependent and identical networked control systems
S Amin, GA Schwartz, SS Sastry
Automatica 49 (1), 186-192, 2013
Understanding the physical and economic consequences of attacks on control systems
YL Huang, AA Cárdenas, S Amin, ZS Lin, HY Tsai, S Sastry
International Journal of Critical Infrastructure Protection 2 (3), 73-83, 2009
Cyber security of water SCADA systems—Part II: Attack detection using enhanced hydrodynamic models
S Amin, X Litrico, SS Sastry, AM Bayen
IEEE Transactions on Control Systems Technology 21 (5), 1679-1693, 2012
Stealthy deception attacks on water SCADA systems
S Amin, X Litrico, SS Sastry, AM Bayen
Proceedings of the 13th ACM international conference on Hybrid systems …, 2010
Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure
S Amin, GA Schwartz, AA Cardenas, SS Sastry
IEEE Control Systems Magazine 35 (1), 66-81, 2015
A game theory model for electricity theft detection and privacy-aware control in AMI systems
AA Cárdenas, S Amin, G Schwartz, R Dong, S Sastry
2012 50th Annual Allerton Conference on Communication, Control, and …, 2012
Using mobile phones to forecast arterial traffic through statistical learning
R Herring, A Hofleitner, S Amin, T Nasr, A Khalek, P Abbeel, A Bayen
89th Transportation Research Board Annual Meeting, 10-14, 2010
In quest of benchmarking security risks to cyber-physical systems
S Amin, GA Schwartz, A Hussain
IEEE Network 27 (1), 19-24, 2013
Mobile century-using GPS mobile phones as traffic sensors: a field experiment
S Amin, S Andrews, S Apte, J Arnold, J Ban, M Benko, RM Bayen, ...
15th World Congress on Intelligent Transportation Systems 2008, 18, 2008
Computational approaches to reachability analysis of stochastic hybrid systems
A Abate, S Amin, M Prandini, J Lygeros, S Sastry
International Workshop on Hybrid Systems: Computation and Control, 4-17, 2007
Sensor placement for fault location identification in water networks: A minimum test cover approach
LS Perelman, W Abbas, X Koutsoukos, S Amin
Automatica 72, 166-176, 2016
Vulnerability of transportation networks to traffic-signal tampering
A Laszka, B Potteiger, Y Vorobeychik, S Amin, X Koutsoukos
2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS …, 2016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20