Biblio
Found 27 results
Filters: Author is Shankar Sastry [Clear All Filters]
"Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure",
IEEE Control Systems, vol. 35, no. 1, pp. 66-81, Feb, 2015.
"Incentive Mechanisms for Internet Congestion Management: Fixed-Budget Rebate Versus Time-of-Day Pricing",
IEEE/ACM Transactions on Networking, vol. 22, no. 2, pp. 647-661, April, 2014.
"Cyber Security of Water SCADA Systems - Part II: Attack Detection Using Enhanced Hydrodynamic Models",
IEEE Transactions on Control Systems Technology, vol. 21, no. 5, pp. 1679-1693, Sept, 2013.
"Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks",
IEEE Transactions on Control Systems Technology, vol. 21, pp. 1963-1970, Sept, 2013.
"Security of interdependent and identical networked control systems",
Automatica, vol. 49, pp. 186 - 192, 2013.
"A game theory model for electricity theft detection and privacy-aware control in AMI systems",
Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pp. 1830-1837, Oct, 2012.
"Congestion pricing using a raffle-based scheme",
Network Games, Control and Optimization (NetGCooP), 2011 5th International Conference on, pp. 1-8, Oct, 2011.
"On the interdependence of reliability and security in Networked Control Systems",
2011 50th IEEE Conference on Decision and Control and European Control Conference, pp. 4078-4083, Dec, 2011.
"Security Interdependencies for Networked Control Systems with Identical Agents",
Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings, pp. 107–122, 2010.
"Stealthy deception attacks on water SCADA systems",
Proceedings of the 13th {ACM} International Conference on Hybrid Systems: Computation and Control, {HSCC} 2010, Stockholm, Sweden, April 12-15, 2010, pp. 161–170, 2010.
"Stealthy deception attacks on water SCADA systems",
HSCC, 2010.
"Safe and Secure Networked Control Systems under Denial-of-Service Attacks",
Hybrid Systems: Computation and Control, 12th International Conference, {HSCC} 2009, San Francisco, CA, USA, April 13-15, 2009. Proceedings, pp. 31–45, 2009.
"Understanding the physical and economic consequences of attacks on control systems",
International Journal of Critical Infrastructure Protection, vol. 2, no. 3, pp. 73 - 83, 2009.
"Research Challenges for the Security of Control Systems",
3rd {USENIX} Workshop on Hot Topics in Security, HotSec'08, San Jose, CA, USA, July 29, 2008, Proceedings, 2008.
"Secure Control: Towards Survivable Cyber-Physical Systems",
ICDCS Workshops, 2008.
"Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems",
Hybrid Systems: Computation and Control, 10th International Workshop, {HSCC} 2007, Pisa, Italy, April 3-5, 2007, Proceedings, pp. 4–17, 2007.
"Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems",
Hybrid Systems: Computation and Control, Berlin, Heidelberg, Springer Berlin Heidelberg, 2007.
"Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems",
Proceedings of the 10th international conference on Hybrid systems: computation and control, 2007.
"Robust feasibility for control of water flow in a reservoir-canal system",
Decision and Control, 2007 46th IEEE Conference on, pp. 1571-1577, Dec, 2007.
"Probabilistic reachability and safe sets computation for discrete time stochastic hybrid systems",
Proceedings of the 45th IEEE Conference on Decision and Control, pp. 258-263, Dec, 2006.
"Reachability Analysis for Controlled Discrete Time Stochastic Hybrid Systems",
Hybrid Systems: Computation and Control, 9th International Workshop, {HSCC} 2006, Santa Barbara, CA, USA, March 29-31, 2006, Proceedings, pp. 49–63, 2006.