1. A prototype for hardware-in-the-loop simulation of a distributed control architecture;Mahalik;IEEE Transactions on Systems, Man and Cybernetics. Part C, Applications and Reviews,2008
2. Detecting integrity attacks on SCADA systems;Mo;IEEE Transactions on Control Systems Technology,2014
3. Safe and secure networked control systems under denial-of-service attacks;Amin,2009
4. Cyber security of water SCADA systems–part I: analysis and experimentation of stealthy deception attacks;Amin;IEEE Transactions on Control Systems Technology,2013
5. Design and implementation of secure networked predictive control systems under deception attacks;Pang;IEEE Transactions on Control Systems Technology,2012