Skip to main navigation
Skip to search
Skip to main content
Illinois Experts Home
LOGIN & Help
Home
Profiles
Research units
Research & Scholarship
Datasets
Honors
Press/Media
Activities
Search by expertise, name or affiliation
An impact-aware defense against Stuxnet
Andrew Clark
, Quanyan Zhu
, Radha Poovendran
,
Tamer Basar
Electrical and Computer Engineering
Coordinated Science Lab
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'An impact-aware defense against Stuxnet'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Control System
100%
Stuxnet
100%
Systems Network
66%
Adversary
66%
System Operator
66%
Programmable Logic Controller
66%
Targeted Control
33%
Process Control
33%
Control Process
33%
Numerical Analysis
33%
Communication Networks
33%
Success Probability
33%
Control Network
33%
Vulnerability
33%
System Framework
33%
Game Analysis
33%
Worst-case Optimal
33%
Randomized Strategy
33%
Security Mechanism
33%
Proactive Defense
33%
Control-theoretic
33%
Local Area
33%
Cryptographic Key
33%
Source Authentication
33%
Sabotage
33%
Industrial Control Systems
33%
Stuxnet Worm
33%
Defense System
33%
Linear Quadratic Regulator
33%
Industrial Control
33%
Saddle Point Equilibrium
33%
Physical Plant
33%
Cryptographic Controls
33%
Message Integrity
33%
Message Source
33%
Network Logic
33%
Cryptanalysis
33%
Integrity Authentication
33%
Sophisticated Malware
33%
Computer Science
Stuxnet
100%
Programmable Logic Controller
66%
Case Study
33%
Communication Network
33%
Authentication
33%
Malware
33%
Security Mechanism
33%
Process Control
33%
Industrial Control System
33%
Equilibrium Point
33%
Cryptographic Key
33%
Control Process
33%
Physical Plant
33%
Success Probability
33%