Follow
Sean Weerakkody
Sean Weerakkody
Department of ECE, Carnegie Mellon Univerisity
Verified email at andrew.cmu.edu
Title
Cited by
Cited by
Year
Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs
Y Mo, S Weerakkody, B Sinopoli
IEEE Control Systems Magazine 35 (1), 93-109, 2015
4952015
Stochastic event-triggered sensor schedule for remote state estimation
D Han, Y Mo, J Wu, S Weerakkody, B Sinopoli, L Shi
IEEE Transactions on Automatic Control 60 (10), 2661-2675, 2015
3342015
Detecting integrity attacks on control systems using a moving target approach
S Weerakkody, B Sinopoli
2015 54th IEEE Conference on Decision and Control (CDC), 5820-5826, 2015
1292015
Detecting integrity attacks on control systems using robust physical watermarking
S Weerakkody, Y Mo, B Sinopoli
53rd IEEE Conference on Decision and Control, 3757-3764, 2014
1162014
Multi-sensor scheduling for state estimation with event-based, stochastic triggers
S Weerakkody, Y Mo, B Sinopoli, D Han, L Shi
IEEE Transactions on Automatic Control 61 (9), 2695-2701, 2015
1122015
Is your commute driving you crazy? a study of misbehavior in vehicular platoons
B DeBruhl, S Weerakkody, B Sinopoli, P Tague
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
862015
A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems
S Weerakkody, X Liu, SH Son, B Sinopoli
IEEE Transactions on Control of Network Systems 4 (1), 60-70, 2017
822017
A Moving Target Defense for Securing Cyber-Physical Systems
P Griffioen, S Weerakkody, B Sinopoli
arXiv preprint arXiv:1902.01423, 2019
762019
Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence
E Bou-Harb, W Lucia, N Forti, S Weerakkody, N Ghani, B Sinopoli
IEEE Communications Magazine 55 (5), 198-204, 2017
512017
Information flow for security in control systems
S Weerakkody, B Sinopoli, S Kar, A Datta
Decision and Control (CDC), 2016 IEEE 55th Conference on, 5065-5072, 2016
482016
Resilient Control in Cyber-Physical Systems: Countering Uncertainty, Constraints, and Adversarial Behavior
S Weerakkody, O Ozel, Y Mo, B Sinopoli
Foundations and Trends® in Systems and Control 7 (1-2), 339-499, 2019
362019
A moving target approach for identifying malicious sensors in control systems
S Weerakkody, B Sinopoli
Communication, Control, and Computing (Allerton), 2016 54th Annual Allerton …, 2016
352016
Robust structural analysis and design of distributed control systems to prevent zero dynamics attacks
S Weerakkody, X Liu, B Sinopoli
2017 IEEE 56th Annual Conference on Decision and Control (CDC), 1356-1361, 2017
322017
A Tutorial on Detecting Security Attacks on Cyber-Physical Systems
P Griffioen, S Weerakkody, B Sinopoli, O Ozel, Y Mo
2019 18th European Control Conference (ECC), 979-984, 2019
302019
A Bernoulli-Gaussian physical watermark for detecting integrity attacks in control systems
S Weerakkody, O Ozel, B Sinopoli
2017 55th Annual Allerton Conference on Communication, Control, and …, 2017
302017
Challenges and Opportunities: Cyber-Physical Security in the Smart Grid
S Weerakkody, B Sinopoli
Smart Grid Control, 257-273, 2019
292019
An optimal design of a moving target defense for attack detection in control systems
P Griffioen, S Weerakkody, B Sinopoli
2019 American Control Conference (ACC), 4527-4534, 2019
282019
A Model Inversion Based Watermark for Replay Attack Detection with Output Tracking
R Romagnoli, S Weerakkody, B Sinopoli
2019 American Control Conference (ACC), 384-390, 2019
262019
Active detection for exposing intelligent attacks in control systems
S Weerakkody, O Ozel, P Griffioen, B Sinopoli
2017 IEEE Conference on Control Technology and Applications (CCTA), 1306-1312, 2017
242017
Physical watermarking for securing cyber physical systems via packet drop injections
O Ozel, S Weerakkody, B Sinopoli
2017 IEEE International Conference on Smart Grid Communications …, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20