Article PDF
Avoid common mistakes on your manuscript.
References
Kim K D, Kumar P R. Cyber-physical systems: A perspective at the centennial. Proc IEEE, 2012, 100: 1287–1308
Yang G, Zhou X. Intelligent CPS: Features and challenges. Sci China Inf Sci, 2016, 59: 050102
Cao Z. New trends of information security-how to change perople’s life (in Chinese)? Sci China Inf Sci, 2016, 59: 050106
Sun H, Wen Q, Li W. A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci China Inf Sci, 2016, 59: 032109
Kriaa S, Pietre-Cambacedes L, Bouissou M, et al. A survey of approaches combining safety and security for industrial control systems. Reliability Eng Syst Safety, 2015, 139: 156–178
Mitchell R, Chen I R. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput Surv, 2014, 46: 1–29
Han S, Xie M, Chen H H, et al. Intrusion detection in cyber-physical systems: techniques and challenges. IEEE Syst J, 2014, 8: 1052–1062
AL-Mohannadi H, Mirza Q, Namanya A, et al. Cyber-attack modeling analysis techniques: An overview. In: Proceedings of the 4th International Conference on Future Internet of Thing and Cloud Workshop. Vienna: IEEE, 2016. 69–76
Teixeira A, Shames I, Sandberg H, et al. A secure control framework for resource-limited adversaries. Automatica, 2015, 51: 135–148
Mo Y, Garone E, Casavola A, et al. False data injection attacks against state estimation in wireless sensor networks. In: Proceedings of the 49th IEEE Conference on Decision and Control. Atlanta: IEEE, 2010. 5967–5972
Zhang H, Cheng P, Shi L, et al. Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans Automat Contr, 2015, 60: 3023–3028
Wu G, Sun J, Chen J. A survey on the security of cyber-physical systems. Control Theor Technol, 2016, 14: 2–10
Pang Z H, Liu G P. Design and implementation of secure networked predictive control systems under deception attacks. IEEE Trans Contr Syst Technol, 2012, 20: 1334–1342
Zhu B, Xie L, Han D, et al. A survey on recent progress in control of swarm systems. Sci China Inf Sci, 2017, 60: 070201
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, J., Zhang, F. & Sun, J. Analysis of security in cyber-physical systems. Sci. China Technol. Sci. 60, 1975–1977 (2017). https://doi.org/10.1007/s11431-017-9174-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11431-017-9174-3