Secure control: Towards survivable cyber-physical systems AA Cardenas, S Amin, S Sastry 2008 The 28th International Conference on Distributed Computing Systems …, 2008 | 795 | 2008 |
Attacks against process control systems: risk assessment, detection, and response AA Cárdenas, S Amin, ZS Lin, YL Huang, CY Huang, S Sastry Proceedings of the 6th ACM symposium on information, computer and …, 2011 | 723 | 2011 |
Research Challenges for the Security of Control Systems. AA Cárdenas, S Amin, S Sastry HotSec 5, 15, 2008 | 647 | 2008 |
Safe and secure networked control systems under denial-of-service attacks S Amin, AA Cárdenas, SS Sastry International Workshop on Hybrid Systems: Computation and Control, 31-45, 2009 | 569 | 2009 |
Challenges for securing cyber physical systems A Cardenas, S Amin, B Sinopoli, A Giani, A Perrig, S Sastry Workshop on future directions in cyber-physical systems security 5 (1), 2009 | 518 | 2009 |
Cyber security analysis of state estimators in electric power systems A Teixeira, S Amin, H Sandberg, KH Johansson, SS Sastry 49th IEEE conference on decision and control (CDC), 5991-5998, 2010 | 409 | 2010 |
Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks S Amin, X Litrico, S Sastry, AM Bayen IEEE Transactions on Control Systems Technology 21 (5), 1963-1970, 2012 | 292 | 2012 |
Cyberphysical security in networked control systems: An introduction to the issue H Sandberg, S Amin, KH Johansson IEEE Control Systems Magazine 35 (1), 20-23, 2015 | 217 | 2015 |
Security of interdependent and identical networked control systems S Amin, GA Schwartz, SS Sastry Automatica 49 (1), 186-192, 2013 | 189 | 2013 |
Understanding the physical and economic consequences of attacks on control systems YL Huang, AA Cárdenas, S Amin, ZS Lin, HY Tsai, S Sastry International Journal of Critical Infrastructure Protection 2 (3), 73-83, 2009 | 169 | 2009 |
Cyber security of water SCADA systems—Part II: Attack detection using enhanced hydrodynamic models S Amin, X Litrico, SS Sastry, AM Bayen IEEE Transactions on Control Systems Technology 21 (5), 1679-1693, 2013 | 152 | 2013 |
Stealthy deception attacks on water SCADA systems S Amin, X Litrico, SS Sastry, AM Bayen Proceedings of the 13th ACM international conference on Hybrid systems …, 2010 | 143 | 2010 |
Using mobile phones to forecast arterial traffic through statistical learning R Herring, A Hofleitner, S Amin, T Nasr, A Khalek, P Abbeel, A Bayen 89th Transportation Research Board Annual Meeting, 10-14, 2010 | 133 | 2010 |
Mobile century using GPS mobile phones as traffic sensors: A field experiment S Amin, S Andrews, S Apte, J Arnold, J Ban, M Benko, RM Bayen, ... | 113 | 2008 |
In quest of benchmarking security risks to cyber-physical systems S Amin, GA Schwartz, A Hussain IEEE Network 27 (1), 19-24, 2013 | 104 | 2013 |
A game theory model for electricity theft detection and privacy-aware control in AMI systems AA Cárdenas, S Amin, G Schwartz, R Dong, S Sastry 2012 50th Annual Allerton Conference on Communication, Control, and …, 2012 | 99 | 2012 |
Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure S Amin, GA Schwartz, AA Cardenas, SS Sastry IEEE Control Systems Magazine 35 (1), 66-81, 2015 | 96 | 2015 |
Computational approaches to reachability analysis of stochastic hybrid systems A Abate, S Amin, M Prandini, J Lygeros, S Sastry International Workshop on Hybrid Systems: Computation and Control, 4-17, 2007 | 81 | 2007 |
Exponential stability of switched linear hyperbolic initial-boundary value problems S Amin, FM Hante, AM Bayen IEEE Transactions on Automatic Control 57 (2), 291-301, 2011 | 65 | 2011 |
Reachability analysis for controlled discrete time stochastic hybrid systems S Amin, A Abate, M Prandini, J Lygeros, S Sastry International Workshop on Hybrid Systems: Computation and Control, 49-63, 2006 | 60 | 2006 |