[1] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” in
Communication, Control, and Computing, 47th
Annual Allerton Conference on. IEEE, pp. 911–918, 2009.
[2] لادن صادقی خرمی و احمد افشار، «طراحی سیستم تشخیص و جداسازی حمله با استفاده از رویتگر با ورودی ناشناخته نامینیمم فاز برای سیستم کنترل مبتنی بر شبکه»، کنفرانس بین المللی مهندسی برق ایران، دوره 24، صفحه 2019-2024، شیراز، 1396.
[3] Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks
on scada systems,” IEEE Transactions on Control Systems Technology,
vol. 22, no. 4, pp. 1396–1407, 2014.
[4] مینا سلیم و محمد جواد خسروجردی، «طراحی تخمین گر عیب با استفاده از تکنیک مبتنی بر داده»، مجله مهندسی برق دانشگاه تبریز، جلد 46، شماره 4، صفحه 147-158، 1395.
[5] مرتضی خرم کشکولی و مریم دهقانی، «تشخیص، شناسایی و جداسازی عیب توربین گاز پالایشگاه دوم پارس جوبی با استفاده از روشهای ترکیبی داده کاوی، kmeans ، تحلیل مؤلفههای اصلی(PCA) و ماشین بردار پشتیبان (SVM)»، مجله مهندسی برق دانشگاه تبریز، جلد 47، شماره 2، صفحه 501-515، 1396.
[6] Khorrami, Ladan Sadeghi, and Ahmad Afshar. "Attack detection in active queue management within large-scale networks control system with information of network and physical system." Electrical Engineering (ICEE), 24th Iranian Conference on. IEEE, 2016.
[7] A. Teixeira, K. C. Sou, H. Sandberg, and K. H. Johansson, “Secure control systems: A quantitative risk management approach,” IEEE Control Systems, vol. 35, no. 1, pp. 24–45, 2015.
[8] Amin, Saurabh, Alvaro A. Cárdenas, and S. Shankar Sastry. "Safe and secure networked control systems under denial-of-service attacks." International Workshop on Hybrid Systems: Computation and Control. Springer, Berlin, Heidelberg, 2009.
[9] Zhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Achieving secure role-based access control on encrypted data in cloud storage." IEEE transactions on information forensics and security 8.12 , pp. 1947-1960, 2013.
[10] F. Farokhi, I. Shames, and N. Batterham, “Secure and private cloud-based control using semi-homomorphic encryption,” IFAC- PapersOnLine, vol. 49, no. 22, pp. 163–168, 2016.
[11] J. Kim, C. Lee, H. Shim, J. H. Cheon, A. Kim, M. Kim, and Y. Song, “Encrypting controller using fully homomorphic encryption for security of cyber-physical systems,” IFAC-PapersOnLine, vol. 49, no. 22, pp. 175–180, 2016.
[12] K. Kogiso and T. Fujita, “Cyber-security enhancement of networked control systems using homomorphic encryption,” in Decision and Control (CDC), 2015 IEEE 54th Annual Conference on. IEEE, pp. 6836–6843, 2015.
[13] Darup, Moritz Schulze, et al. "Towards encrypted mpc for linear constrained systems." IEEE Control Systems Letters 2.2 , pp. 195-200, 2018.
[14] Alexandru, Andreea B., Manfred Morari, and George J. Pappas. "Cloud-based MPC with Encrypted Data." arXiv preprint arXiv:, pp. 1803.09891, 2018.
[15] A. Al-Anwar, Y. Shoukry, S. Chakraborty, P. Martin, P. Tabuada, and M. B. Srivastava, “Proloc: resilient localization with private observers using partial homomorphic encryption,” in International Conference on Information Processing in Sensor Networks, pp. 41–52, 2017.
[16] M. Zamani, L. Sadeghikhorrami, A.A. Safavi, and F. Farokhi, “Private state estimation for cyber physical systems using semi homomorphic encryption,” Proceedings of the 23nd International Symposium on Mathematical Theory of Networks and Systems, pp. 399–404, 2018.
[17] F. J. Gonzalez-Serrano, A. Amor-Martın, and J. Casamayon-Anton, “State estimation using an extended kalman filter with privacy- protected observed inputs,” in IEEE International Workshop on In- formation Forensics and Security. IEEE, pp. 54–59, 2014.
[18] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp. 223– 238, 1999.
[19] Z.-P. Jiang and Y. Wang, “Input-to-state stability for discrete-time nonlinear systems,” Automatica, vol. 37, no. 6, pp. 857 – 869, 2001.
[20] F. Zhang, Matrix theory: basic results and techniques. Springer Science & Business Media, 2011.
[21] L.Ricker, ”Model predictive control of a continuous nonlinear two-phase reactor”. Journal of Process Control, vol. 3, Nov, 1993.
[22] R.Chaboksawar, Y.Mo and B.Sinopoli, “Detecting integrity attacks on SCADA systems”. Preprints of the 18th IFAC World Congress, Milano, Italy, 2011.