共 26 条
- [1] Chen T M., Stuxnet, the real start of cyber warfare?, IEEE Network, 24, pp. 2-3, (2010)
- [2] Fidler D P., Was Stuxnet an act of war? Decoding a cyberattack, IEEE Secur Privacy Mag, 9, pp. 56-59, (2011)
- [3] Zhou K, Doyle J C, Glover K., Robust and Optimal Control, (1996)
- [4] Chen H, Guo L., Identification and Stochastic Adaptive Control, Stochastics & Stochastic Reports, pp. 123-128, (1991)
- [5] Guan X H, Shen C, Liu T., Data security is the foundation of cyberspace security, China Netw Inform, 1, pp. 233-236, (2022)
- [6] Zhang J F, Tan J W, Wang J M., Privacy security in control systems, Sci China Inf Sci, 64, (2021)
- [7] Ny J L, Pappas G J., Differentially Private Filtering, IEEE Trans Automat Contr, 59, pp. 341-354, (2012)
- [8] Wang J M, Tan J W, Zhang J F., Differentially private distributed parameter estimation, J Syst Sci Complex, 36, pp. 187-204, (2023)
- [9] Zhu M, Lu Y., On confidentiality preserving monitoring of linear dynamic networks against inference attacks, Proceedings of American Control Conference, pp. 359-364, (2015)
- [10] Katz J, Lindell Y., Introduction to Modern Cryptography, (2020)