Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Cyberphysical security in networked control systems: An introduction to the issue
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0003-1835-2963
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.ORCID iD: 0000-0001-9940-5929
2015 (English)In: IEEE CONTR SYST MAG, ISSN 1066-033X, Vol. 35, no 1, 20-23 p.Article in journal (Refereed) Published
Abstract [en]

This special issue provides an introduction to cyberphysical security of networked control systems (NCSs) and summarizes recent progress in applying fundamentals of systems theory and decision sciences to this new and increasingly promising area. NCS applications range from large-scale industrial applications to critical infrastructures such as water, transportation, and electricity networks. The security of NCSs naturally depends on the integration of cyber and physical dynamics and on different ways in which they are affected by the actions of human decision makers. Thus, problems in this area lie at the intersection of control systems and computer security. The six articles that constitute this special issue approach cyberphysical security from a variety of perspectives, including control theory, optimization, and game theory. They cover a range of topics such as models of attack and defense, risk assessment, his special issue provides an introduction to cyberphysical security of networked control systems (NCSs) and summarizes recent progress in applying fundamentals of systems theory and decision sciences to this new and increasingly promising area. NCS applications range from large-scale industrial applications to critical infrastructures such as water, transportation, and electricity networks. The security of NCSs naturally depends on the integration of cyber and physical dynamics and on different ways in which they are affected by the actions of human decision makers. Thus, problems in this area lie at the intersection of control systems and computer security. The six articles that constitute this special issue approach cyberphysical security from a variety of perspectives, including control theory, optimization, and game theory. They cover a range of topics such as models of attack and defense, risk assessment,attack detection and identification, and secure control design.A common theme among these contributions is an emphasis on the development of a principled approach to cyberphysical security of NCS.

Place, publisher, year, edition, pages
2015. Vol. 35, no 1, 20-23 p.
National Category
Robotics Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-160371DOI: 10.1109/MCS.2014.2364708ISI: 000348209200008Scopus ID: 2-s2.0-84921465103OAI: oai:DiVA.org:kth-160371DiVA: diva2:791227
Note

QC 20150227

Available from: 2015-02-27 Created: 2015-02-19 Last updated: 2015-02-27Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Sandberg, HenrikJohansson, Karl Henrik

Search in DiVA

By author/editor
Sandberg, HenrikJohansson, Karl Henrik
By organisation
Automatic ControlACCESS Linnaeus Centre
RoboticsControl Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 821 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf