1. A. Teixeira, H. Sandberg, K. H. Johansson. Networked control systems under cyber attacks with applications to power networks. Proceedings of the American Control Conference, Maryland: IEEE, 2010: 3690–3696.
2. S. Sundaram, M. Pajic, C. N. Hadjicostis, et al. The wireless control network: Monitoring for malicious behavior. IEEE Conference on Decision and Control, Atlanta: IEEE, 2010: 5979–5984.
3. R. Chabukswar, Y. Mo, B. Sinopoli. Detecting integrity attacks on SCADA systems. Proceedings of the 18th IFAC World Congress, Milano: IEEE, 2014: 11239–11244.
4. T. T. Kim, H. V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2011, 2(2): 326–333.
5. B. Tang, L. D. Alvergue, G. Gu. Secure networked control systems against replay attacks without injecting authentication noise. Proceedings of the American Control Conference, Montreal: IEEE, 2012: 60280–6036.