Secure state

A secure state is an information systems security term to describe where entities in a computer system are divided into subjects and objects, and it… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1982-2017
0102019822017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The joint task of detecting attacks and securely monitoring the state of a cyber-physical system is addressed over a cluster… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
We consider the problem of network-based attacks, such as Man-in-the-Middle attacks, on standard state estimators. To ensure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of estimating the state of a… (More)
  • figure 1
Is this relevant?
2015
2015
This paper presents IMHOTEP-SMT, a solver for the detection and mitigation of sensor attacks in cyber-physical systems. IMHOTEP… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2011
2011
System state estimation and control are important issues to ensure the stability and reliability of the smart grid system. In… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We consider the problem of state-estimation of a linear dynamical system when some of the sensor measurements are corrupted by an… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2006
2006
  • S.M. Price
  • 2006 IEEE Information Assurance Workshop
  • 2006
The information assurance (IA) model, an extension of the McCumber information security model, specifies security services for… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in… (More)
  • figure V
Is this relevant?
Highly Cited
1995
Highly Cited
1995
| This paper presents a new approach to representing and detecting computer penetrations in real-time. The approach, called state… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1992
Highly Cited
1992
| This paper presents a new approach to representing and detecting computer penetrations in real-time. The approach, called state… (More)
Is this relevant?