Fault Detection and Diagnosis of Continuous Process Based on Multiblock Principal Component Analysis, 2009 International Conference on Computer Engineering and Technology, pp.200-204, 2009. ,
DOI : 10.1109/ICCET.2009.107
Attack and Fault Identification in Electric Power Control Systems: An Approach to Improve the Security, 2007 IEEE Lausanne Power Tech, pp.103-107, 2007. ,
DOI : 10.1109/PCT.2007.4538300
Industrial cybersecurity for power systems and SCADA networks, Proceedings of the Fifty-Second Annual Petroleum and Chemical Industry Conference, pp.303-309, 2005. ,
DOI : 10.1109/pcicon.2005.1524567
Performance analysis of probabilistic packet marking in IPv6, Computer Communications, vol.30, issue.16, pp.3193-3202, 2007. ,
DOI : 10.1016/j.comcom.2007.05.060
A plant-wide industrial process control problem, Computers & Chemical Engineering, vol.17, issue.3, pp.245-255, 1993. ,
DOI : 10.1016/0098-1354(93)80018-I
Safeguarding critical infrastructures, in Dependable Computing Systems: Paradigms, Performance Issues and, pp.479-499, 2005. ,
A Moving Horizon State Estimation algorithm applied to the Tennessee Eastman Benchmark Process, 2006 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, pp.377-382, 2006. ,
DOI : 10.1109/MFI.2006.265620
Plant-wide control ? A review and a new design procedure, Modeling, Identification and Control, pp.209-240, 2000. ,
A formal adversary capability model for SCADA environments, presented at the Fifth International Workshop on Critical Information Infrastructure Security, 2010. ,
Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes, pp.81-94, 2010. ,
DOI : 10.1007/978-3-642-16806-2_6
Base control for the Tennessee Eastman problem, Computers & Chemical Engineering, vol.18, issue.5, pp.383-413, 1994. ,
DOI : 10.1016/0098-1354(94)88019-0
Decentralized control of the Tennessee Eastman Challenge Process, Journal of Process Control, vol.6, issue.4, pp.205-221, 1996. ,
DOI : 10.1016/0959-1524(96)00031-5
?-Calculus: A Theory of Mobile Processes, 2001. ,
Optimal State Estimation: Kalman, H ? and Nonlinear Approaches, 2006. ,
DOI : 10.1002/0470045345
Context Information based Cyber Security Defense of Protection System, 2007 IEEE Power Engineering Society General Meeting, pp.1477-1481, 2007. ,
DOI : 10.1109/PES.2007.385649
Using Physical Models for Anomaly Detection in Control Systems, Critical Infrastructure Protection III, pp.139-149, 2009. ,
DOI : 10.1016/j.compstruc.2007.01.008
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling, Part A: Systems and Humans), pp.853-865, 2010. ,
DOI : 10.1109/TSMCA.2010.2048028
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.2858
Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS), 2008 IEEE Conference on Technologies for Homeland Security, pp.469-473, 2008. ,
DOI : 10.1109/THS.2008.4534498