
%% Created for alvaro at 2007-09-30 16:07:01 -0700 

@book{yahooMaps,
author ={Staff writers},
title = {Yahoo Selects TrafficCast to Enhance Yahoo Map Interactivity with Real-Time Traffic Data},
Address = {http://www.businesswire.com/portal/site/home/},
month = {July},
year = {2008},
}

@book{trafficcast,
author={Company release},
title = {TrafficCast International Inc.},
Address = {http://www.trafficcast.com/},
month = {July},
year = {2008},
}

@Article{skagero05trb,
author = {Nikolas.~Geroliminis and Alexander.~Skabardonis},
title = {Prediction of arrival profiles and queue lengths along signalized arterials using a Markov decision process},
journal = {Transportation research record},
year = {2005},
volume = {1934},
%number = {6},
pages = {116--124},
}

@Article{HellingaFu08,
author = {Bruce R. Hellinga and Liping Fu},
title = {Decomposing travel times measured by probe-based traffic monitoring systems to individual road segments},
journal = {Transportation research part C: Emerging Technologies, Forthcoming},
year = {2008},
%volume = {10},
%number = {4},
%pages = {257--273},
}



@Article{HellingaFu,
author = {Bruce R. Hellinga and Pedram Izadpanah and Hiroyuki Takada and Liping Fu},
title = {Reducing bias in probe-based arterial link travel time estimates},
journal = {Transportation research part C: Emerging Technologies},
year = {2002},
volume = {10},
number = {4},
pages = {257--273},
}


@Article{Senetal,
author = {Ashish Sen and Piyushimita Thakuriah and Xia-Quon Zhu and Alan Karr},
title = {Frequency of Probe Reports and Variance of Travel Time Estimates},
journal = {Journal of Transportation Engineering},
year = {1997},
volume = {123},
number = {4},
pages = {290--297},
}




@inproceedings{HoheBayenetal,
 author = {Baik Hoh and Marco Gruteser and Ryan Herring and Jeff Ban and Daniel Work and Juan-Carlos Herrera and Alexandre M. Bayen and Murali Annavaram and Quinn Jacobson},
 title = {Virtual trip lines for distributed privacy-preserving traffic monitoring},
 booktitle = {MobiSys '08: Proceeding of the 6th international conference on Mobile systems, applications, and services},
 year = {2008},
 pages = {15--28},
 location = {Breckenridge, CO, USA},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{skagero05a,
author = {Alexander.~Skabardonis and Nikolas.~Geroliminis},
title = {Real-time estimation of travel times along signalized arterials.},
Booktitle = {Proceedings of the 16th Internation symposium on transportation and traffic theory},
%volume = {15},
%number = {6},
pages = {387--406},
year = {2005},
location = {Maryland, USA},
}

@TechReport{skapems,
author = {Alexander.~Skabardonis and Nikolas.~Geroliminis and Pravin Varaiya},
title = {Development of an arterial performance measurement system},
institution = {Working paper, Institute of transportation studies, University of California Berkeley},
year = {2004},
%month = {August},
}
@Article{stathopoulos,
author = {Anthony Stathopoulos and Matthew G. Karlaftis},
title = {A multivariate state space approach for urban traffic flow modeling and prediction},
journal = {Transportation research part C: Emerging Technologies},
year = {2003},
volume = {11},
number = {2},
pages = {121--135},
}

@Article{Vlahogiannia,
author = {Eleni I. Vlahogiannia, and Matthew G. Karlaftis and John C. Goliasa},
title = {Statistical methods for detecting nonlinearity and non-stationarity in univariate short-term time-series of traffic volume},
journal = {Transportation research part C: Emerging Technologies},
year = {2006},
volume = {14},
number = {5},
pages = {351--367},
}

@inproceedings{vlahogianni07,
author = {Eleni~I. Vlahogianni and Nikolas.~Geroliminis and Alexander.~Skabardonis},
title = {On traffic flow regimes and transitions in signalized intersections},
booktitle = {TRB 86th annual meeting compendium of papers CD-ROM. Paper \# 07-2321},
year = {2007},
%volume = {15},
%number = {6},
%pages = {392--403},
}

@Article{skagero07trc,
author = {Eleni~I. Vlahogianni and Charles~L. Webber~Jr. and Nikolas.~Geroliminis and Alexander.~Skabardonis},
title = {Statistical characteristics of transitional queue conditions in signalized intersections},
journal = {Transportation research part C: Emerging Technologies},
year = {2007},
volume = {15},
number = {6},
pages = {392--403},
}



@Article{BarGera07,
author = {Hillel Bar-Gera},
title = {Evaluation of a cellular phone-based system for measurements of traffic speeds and travel times: a case study from Israel},
journal = {Transportation research part C},
year = {2007},
volume = {15},
number = {6},
pages = {380-391},
}

@Article{papageorgiou05,
author = {Yibing Wang and Markos Papageorgiou},
title = {Real-time freeway traffic state estimation based on extended Kalman filter: a general approach},
journal = {Transportation research part B},
year = {2007},
volume = {39},
number = {2},
pages = {141-167},
}


@Article{CTMa,
author = {Carlos Daganzo},
title = {The cell transmission model: a dynamic representation of highway traffic consistent with the hydrodynamic theory},
journal = {Transportation research part B},
year = {1994},
volume = {28},
number = {4},
pages = {269--287},
}


@Article{CTMb,
author = {Carlos Daganzo},
title = {The cell transmission model, Part~II: network traffic},
journal = {Transportation research part B},
year = {1995},
volume = {29},
number = {2},
pages = {79--93},
}



@Article{StrubBayen06,
author = {Issam Strub and Alexandre M. Bayen},
title = {Weak formulation of the boundary conditions for scalar conservation laws: an application to highway traffic modelling},
journal = {International journal of robust nonlinear control},
year = {2006},
volume = {16},
number = {--},
pages = {733--748},
}



@Article{Nanthawichit,
author = {Chumchoke Nnathawichit and Takashi Nkatsuji and Hironori Suzuki},
title = {Application of probe-vehicle data for real-time traffic-state estimation and short-term travel-time prediction on a freeway},
journal = {Transportation research record: journal of the transportation research board},
year = {2003},
volume = {1855},
%number = {--},
pages = {49--59},
}

@Article{Kurzhanskiy,
author = {Gabriel Gomes and Roberto Horowitz and Alex A. Kurzhanskiy and Pravin Varaiya},
title = {Qualitative theory of the cell transmission model},
journal = {Unknown},
year = {2008},
volume = {--},
number = {--},
pages = {--},
}

@TechReport{BlandinBayen,
author = {Sebastian Blandin and Alexandre M. Bayen},
title = {A first order hyperbolic partial differential equation formulation of speed evolution on highways},
institution = {Lagrangian sensor systems laboratory, UC Berkeley},
year = {2008},
type = {Technical Report},
number = {--},
month = {February},
}


@TechReport{SanwalWalrand,
author = {Kumud K. Sanwal and Jean Walrand},
title = {Vehicles as probes},
institution = {Institute of Transportation Studies, UC Berkeley},
year = {1995},
type = {California PATH working paper},
number = {UCB-ITS-PWP-95-11},
%month = {February},
}


@TechReport{Ygnace,
author = {Jean-Luc Ygnace and Chris Drane and Y.B. Yim and Renaud de Lacvivier},
title = {Travel time estimation on the San Francisco Bay area network using cellular phones as probes},
institution = {Institute of Transportation Studies, UC Berkeley},
year = {2000},
type = {California PATH working paper},
number = {UCB-ITS-PWP-2000-18},
%month = {February},
}


@inproceedings{SMMHorowitz,
	Author = {Laura Munoz and Xiaotian Sun and Roberto Horowitz and Luis Alvarez},
	Booktitle = {Proceedings of the American control conference},
  Keywords = {smm},
	Pages = {3750--3755},
	Title = {Traffic density estimation with the cell transmission model},
	Year = {2003}}
	


%% Saved with string encoding Western (ASCII) 
@inproceedings{CAS07,
	Author = {Alvaro A.  C\'ardenas and Saurabh Amin and Shankar Sastry},
	Title = {Secure control: towards survivable cyber-physical systems},
	Booktitle = {The First International Workshop on Cyber-Physical Systems (WCPS2008), submitted},
  Keywords = {taxonomy},
	Pages = {-},
	Year = {2007}}
	
	
	
@inproceedings{Freiling,
	Author = {Zinaida Benenson and Felix C. Freiling and Thorsten Holz and Dogan Kesdogan and Lucia Draque Penso},
	Title = {Safety, Liveness, and Information Flow: Dependability Revisited},
	Booktitle = {ARCS Workshops },
  Keywords = {safelive},
	Pages = {56--65},
	Year = {2006}}

@article{secfaulttol,
author = {Ben Hardekopf and Kevin Kwiat},
title = {Exploiting the Overlap of Security and Fault-Tolerance},
journal = {aiworc},
volume = {0},
year = {2000},
%isbn = {0-7695-0628-3},
pages = {361},
%doi = {http://doi.ieeecomputersociety.org/10.1109/AIWORC.2000.843317},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}


@inproceedings{Sinopolicdc07,
	Author = {Emanuele Garone and Bruno Sinopoli and Andrea Goldsmith and Alessandro Casavola},
	Booktitle = {Proceedings of the 46th IEEE conference on decision and control},
  Keywords = {cdc07sinopo},
	Pages = {44--49},
	Title = {LQG control for distributed systems over TCP-like erasure channels},
	Year = {2007}}
	
@inproceedings{Gartner02,
  author    = {Felix C. G{\"a}rtner},
  title     = {Revisiting Liveness Properties in the Context of Secure
               Systems},
  booktitle = {FASec},
  year      = {2002},
  pages     = {221-238},
  %ee        = {http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=2629{\&}spage=221},
  %crossref  = {DBLP:conf/fasec/2002},
  %bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{rushby94critical,
    author = {John Rushby},
    title = {Critical System Properties: Survey and Taxonomy},
    journal = {Reliability Engineering and System Safety},
    volume = {43},
    number = {2},
    pages = {189--219},
    year = {1994},
    %url = "citeseer.ist.psu.edu/rushby94critical.html" 
    }



@Article{Schneider00,
author = {Fred B. Schneider},
title = {Enforceable Security Policies},
journal = {ACM Transactions on Information and System Security},
year = {2000},
number = {3},
volume = {1},
pages = {30-50},
}


@Article{Schneier01,
author = {Bruce Schneier},
title = {Managed Security Monitoring: Network Security for the 21st Century},
journal = {Computers \& Security},
year = {2001},
number = {20},
pages = {491--503},
}


@article{CCNCS,
	Author = {John Baillieul and Panos J. Antsaklis},	
	Journal = {Proceedings of the IEEE},
	Keywords = {CCNCS},
	Month = {January},
	Number = {1},
	Pages = {9--28},
	Title = {Control and communication challenges in networked real-time systems},
	Volume = {95},
	Year = {2007}}

@article{Verdu,
	Author = {Sergio Verdu and H. Vincent Poor},	
	Journal = {IEEE Transactions on Information Theory},
	Keywords = {Infotheory},
	Month = {March},
	Number = {2},
	Pages = {328--340},
	Title = {On minimax robustness: A general approach and applications},
	Volume = {30},
	Year = {1984}}

 
@inproceedings{Barreno06,
	address = {New York, NY, USA},
	author = {Marco Barreno and Blaine Nelson and Russell Sears and Anthony  D. Joseph  and Doug J. Tygar },
	booktitle = {ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security},
	keywords = {occ-applications, occ-support-vector},
	pages = {16--25},
	%priority = {2}%
	publisher = {ACM Press},
	title = {Can machine learning be secure?},
	%url = {http://portal.acm.org/citation.cfm?id=1128817.1128824},
	year = {2006}
}

@inproceedings{Huang07,
	address = {Anchorage, Alaska, USA},
	author = {Ling Huang and XuanLong Nguyen and Minos Garofalakis and Joseph Hellerstein and Anthony D. Joseph and Michael Jordan and Nina Taft},
	booktitle = {Proceedings of the 26th Annual IEEE Conference on Computer Communications (INFOCOM'07)},
	keywords = {occ-applications, occ-support-vector},
%	pages = {16--25},
	%priority = {2}%
	publisher = {ACM Press},
	title = {Communication-Efficient Online Detection of Network-Wide Anomalies},
	%url = {http://portal.acm.org/citation.cfm?id=1128817.1128824},
	year = {2007}
}



@article{surveyNCS,
	Author = {Joao P. Hepanha and Payam Naghshtabrizi and Yonggang Xu},	
	Journal = {Proceedings of the IEEE},
	Keywords = {surveyNCS},
	Month = {January},
	Number = {1},
	Pages = {138--162},
	Title = {A survey of recent results in networked control systems},
	Volume = {95},
	Year = {2007}}

@article{consensus,
	Author = {Reza Olfati-Saber and J. Alex Fax and Richard M. Murray},	
	Journal = {Proceedings of the IEEE},
	Keywords = {surveyNCS},
	Month = {January},
	Number = {1},
	Pages = {215-233},
	Title = {Consensus and Cooperation in Networked Multi-Agent Systems},
	Volume = {95},
	Year = {2007}}

@article{sinopoli,
	Author = {Luca Schenato and Bruno Sinopoli and Massimo Franceschetti and Kameshwar Poolla and S. Shankar Sastry},	
	Journal = {Proceedings of the IEEE},
	Keywords = {LQGloss},
	Month = {January},
	Number = {1},
	Pages = {163--187},
	Title = {Foundations of control and estimation over lossy networks},
	Volume = {95},
	Year = {2007}}
	
@article{sinopolia,
	Author = {Bruno Sinopoli and Luca Schenato and Massimo Franceschetti and Kameshwar Poolla and S. Shankar Sastry},	
	Journal = {IEEE Transactions on Automatic control},
	Keywords = {Kalmaninter},
	Month = {September},
	Number = {9},
	Pages = {163--187},
	Title = {Kalman filtering with intermittent observations},
	Volume = {49},
	Year = {2004}}

@inproceedings{BDHJ07,
Author = {A. Bemporad and S. Di Cairano and E. Henriksson and K. H. Johansson},
Title = {Hybrid Model Predictive Control Based on Wireless Sensor Feedback: An Experimental Study},
booktitle = {Proceedings of CDC 2007},
address={New Orleans, LA},
Year = 2007,
}

@inproceedings{olfati05,
Author = {Reza Olfat-Saber},
Title = {Distributed Kalman filter with embedded consensus filter},
booktitle = {Proceedings of CDC and ECC},
address={Seville, Spain},
Year = 2005,
}

	
@article{Amin03,
  author    = {Massoud Amin},
  title     = {North America's Electricity Infrastructure: Are We Ready
               for More Perfect Storms?},
  journal   = {IEEE Security {\&} Privacy},
  volume    = {1},
  number    = {5},
  year      = {2003},
  pages     = {19-25}}

@inproceedings{vanetsec,
  author    = {Maxim Raya and
               Jean-Pierre Hubaux},
  title     = {The security of vehicular ad hoc networks},
  booktitle = {SASN},
  year      = {2005},
  pages     = {11-21}}

@inproceedings{waterscada,
  author    = {Xavier Litrico and
               Pierre-Olivier Malaterre},
  title     = {Test of auto-tuned downstream controllers on Gignac canal.},
  booktitle = {USCID conference on SCADA},
  year      = {2007},
  pages     = {11-21}}


@MastersThesis{Lyons:Thesis:2005,
    author     =     {Jeff Lyons},
    title     =     {Distributed Monitoring and Control and Physical System Modeling for a Laboratory Three-Tank System},
    school     =     {Vanderbilt University},
    address     =     {USA},
    year     =     {2005},
 %   month     =     {April},
}

%\bibitem{Litrico07}
%{Litrico},~X., {Malaterre},~P.-O.:  
%\newblock \emph{Test of auto-tuned downstream controllers on Gignac canal.}
%\newblock USCID conference on SCADA, (2007).


@article{Basar07,
	Author = {Sedar Yuksel and Tamer Basar},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {decentralized},
	Month = {October},
	Number = {10},
	Pages = {1969--1974},
	Title = {Optimal signaling policies for decentralized multicontroller stabilizability over communication channels},
	Volume = {52},
	Year = {2007}}

@article{Hinf1,
	Author = {Fuwen Yang and Zidong Wang and Y.S. Hung and Mahbub Gani},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {Hinfinity},
	Month = {March},
	Number = {3},
	Pages = {511--518},
	Title = {$\mathcal{H}_{\infty}$	control for networked systems with random communication delays},
	Volume = {51},
	Year = {2006}}

@article{Hinf2,
	Author = {Huijun Gao and Tongwen Chen},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {Hinfinity2},
	Month = {November},
	Number = {11},
	Pages = {2070--2084},
	Title = {$\mathcal{H}_{\infty}$	estimation for uncertain systems with limited communication capacity},
	Volume = {52},
	Year = {2007}}

@article{activefault,
	Author = {Henrik Niemann},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {faultdiagnosis},
	Month = {September},
	Number = {9},
	Pages = {1572--1578},
	Title = {A setup for active fault diagnosis},
	Volume = {51},
	Year = {2006}}

@article{sensorloc,
	Author = {Christian Commault and Jean-Michel Dion},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {Hinfinity},
	Month = {February},
	Number = {2},
	Pages = {155--169},
	Title = {Sensor location for diagnosis in linear systems: a structural analysis},
	Volume = {52},
	Year = {2007}}
	
@article{faulttol,
	Author = {Jakob Stoustrup and Vincent D. Blondel},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {faulttolerance},
	Month = {February},
	Number = {2},
	Pages = {305--310},
	Title = {Fault tolerant control: a simultaneous stabilization result},
	Volume = {49},
	Year = {2004}}
	
@article{secsync,
	Author = {Sergej Celikovsky and Guanrong Chen},	
	Journal = {IEEE Transactions on Automatic Control},
	Keywords = {secsync},
	Month = {January},
	Number = {1},
	Pages = {76--82},
	Title = {Secure synchronization of a class of chaotic systems from a nonlinear observer approach},
	Volume = {50},
	Year = {2005}}

@article{chaossync1,
	Author = {H. Nijmeijer},	
	Journal = {Physica D},
	Keywords = {chaossync},
	Month = {June},
	Number = {3-4},
	Pages = {219--228},
	Title = {A dynamical control view on synchronization},
	Volume = {154},
	Year = {2001}
}

@article{taxonomyimp,
	Author = {Algirdas Avizienis and Jean-Claude Laprie and Brian Randell and Carl Landwehr},	
	Journal = {IEEE Transactions on Dependable and Secure Computing},
	Keywords = {fulltaxonomy},
	Month = {January-March},
	Number = {1},
	Pages = {11--32},
	Title = {Basic concepts and taxonomy of dependable and secure computing},
	Volume = {1},
	Year = {2004}}	

@article{dossensor,
	Author = {Anthony D. Wood, John A. Stankovic},	
	Journal = {Computer},
	Keywords = {dossensor},
	Month = {January-March},
	Number = {10},
	Pages = {54--62},
	Title = {Denial of service in sensor networks},
	Volume = {35},
	Year = {2002}}		
	
	 
@article{modelbased,
	Author = {David M. Nicol and William H. Sanders and Kishor S. Trivedi},	
	Journal = {IEEE Transactions on Dependable and Secure Computing},
	Keywords = {modelbased},
	Month = {January-March},
	Number = {1},
	Pages = {48--65},
	Title = {Basic concepts and taxonomy of dependable and secure computing},
	Volume = {1},
	Year = {2004}}

@article{interdep,
	Author = {Steven M. Rinaldi and James P. Peerenboom and Terrence K. Kelly},	
	Journal = {IEEE Control Systems Magazine},
	Keywords = {interdependencies},
	Month = {December},
	Pages = {11--25},
	Title = {Identifying, understanding, and analysing critical infrastructure interdependencies},
	Year = {2001}}

@article{LeeActor,
	Author = {Jie Liu and Jorn W. Janneck and Xiaojun Liu and Edward A. Lee},	
	Journal = {IEEE Transactions on Control Systems Technology},
	Keywords = {modelbased},
	Month = {January-March},
	Number = {12},
	Pages = {250-262},
	Title = {Actor-oriented control system design: A responsible framework perspective},
	Volume = {2},
	Year = {2004}}

@article{Koopman04,
  author    = {Philip Koopman},
  journal   = {IEEE Computer},
  number    = {7},
  pages     = {95-97},
  title     = {Embedded System Security},
  volume    = {37},
  year      = {2004},
}

@ARTICLE{GKM06,
        AUTHOR = {Paul J. Goulart and Eric C. Kerrigan and Jan M. Maciejowski},
        TITLE = {Optimization over state feedback policies for robust control with constraints},
        JOURNAL = {Automatica},
        YEAR = {2006},
        VOLUME = {42},
        NUMBER = {4},
        PAGES = {523-533}
}  



@TechReport{Wing,
author = {Kong-wei Lye and Jeannette Wing},
title = {Game strategies for network security},
institution = {School of computer science, Carnegie Mellon University},
year = {2002},
type = {Technical Report},
number = {CMU/CS-2002-136},
month = {May},
}

@inproceedings{Hinfinity3,
	Author = {Muralidhar Ravuri and Ching-Yao Kao and Alexandre Megretski},
	Booktitle = {Proceedings of the 39th IEEE Conference on Decision and Control},
  Keywords = {adversary},
	Pages = {3212--3217},
	Title = {Hierarchical optimization in the presence of an intelligent adversary - an $\mathcal{H}_{\infty}$ approach},
	Year = {2000}}

@inproceedings{DNCS,
	Author = {Songhwai Oh and Shankar Sastry},
	Title = {Distributed Networked Control System with Lossy Links: State Estimation and Stabilizing Communication Control},
	Booktitle = {Proceedings of the 45th IEEE Conference on Decision and Control},
  Keywords = {dncs},
  Month = {December},
	Pages = {1942--1947},
	Year = {2006}}

@inproceedings{IDSgame,
	Author = {Tansu Alpcan and Tamer Basar},
	Booktitle = {Proceedings of the 43rd IEEE Conference on Decision and Control},
  Keywords = {game},
  Month = {December},
	Pages = {1568--1573},
	Title = {A game theoretic analysis of intrusion detection in access control systems},
	Year = {2004}}

@inproceedings{stabilityfault,
	Author = {Shanbin Li and Dominique Sauter and Christophe Aubrun and Joseph Yam\'e},
	Booktitle = {European Control Conference, ECC'07},
  Keywords = {fault},
	Pages = {3212--3217},
	Title = {Stability Guaranteed Active Fault Tolerant Control of Networked Control Systems},
	Year = {2007}}

@inproceedings{HanJainLukPerrig2007,
    author = {Jun Han and  Abhishek Jain and Mark Luk and Adrian Perrig},
    title = {Don't Sweat Your Privacy: Using Humidity to Detect
              Human Presence},
    booktitle = {Proceedings of 5th International Workshop on
              Privacy in UbiComp (UbiPriv'07)},
    month = {September},
    year = {2007},
}



@TechReport{ELee07,
author = {Edward Lee},
title = {Computing Foundations and Practice for Cyber-Physical Systems:
A Preliminary Report},
institution = {University of California, Berkeley},
year = {2007},
type = {Technical Report},
number = {UCB/EECS-2007-72},
month = {May},
}





@TechReport{sandia,
author = {Jasib Stamp and John Dillinger and William Young and Jennifer DePoy},
title = {Common vulnerabilities in critical infrastructure control systems},
institution = {Sandia National Laboratories},
year = {2003},
type = {Technical Report},
number = {SAND-2003-1772C},
month = {May},
}

@TechReport{PCAST,
author = {John H. Marburger, III and E. Floyd Kvamme},
title = {Leadership Under Challenge: Information Technology {R{\&}D} in a 
Competitive World. {A}n Assessment of the Federal Networking and Information
Technology {R{\&}D} Program},
institution = {President's Council of Advisors on Science and Technology},
year = {2007},
month = {August},
}

@Book{Eisenhauer06,
author = {Jack Eisenhauer and Paget Donnelly and Mark Ellis and Michael O'Brien},
title = {Roadmap to Secure Control Systems in the Energy Sector},
publisher = {Energetics Incorporated. Sponsored by the U.S. Department of 
Energy and the U.S. Department of Homeland Security},
year = {2006},
month = {January},
}

@InProceedings{Byres04,
author = {Eric Byres and Justin Lowe},
title = {The Myths and Facts Behind Cyber Security Risks for Industrial Control Systems},
booktitle = {Proceedings of the VDE Congress, VDE Association for Electrical
Electronic \& Information Technologies},
year = {2004},
month = {October},
}

@InProceedings{FTCreview,
author = {Youmin Zhang and Jin Jiang},
title = {Bibliographical review of reconfigurable fault-tolerant control systems},
booktitle = {Proceedings of the IFAC symposium on faul detection, supervision and safety for technical processes},
year = {2003},
month = {June},
}


@TechReport{GAO07,
author = {United States Government Accountability Office},
title = {Critical Infrastructure Protection. {M}ultiple Efforts to Secure 
Control Systems Are Under Way, but Challenges Remain},
Institution = {Report to Congressional Requesters},
number = {GAO-07-1036},
year = {2007},
month = {2007},
}

@TechReport{Turk05,
author = {Robert J. Turk},
title = {Cyber Incidents Involving Control Systems},
institution = {Idao National Laboratory},
year = {2005},
number = {INL/EXT-05-00671},
month = {October},
}



@book{generator,
	Author = {Jeanne Meserve},
	Date-Added = {2007-09-30 15:16:11 -0700},
	Date-Modified = {2007-09-30 15:17:43 -0700},
	Address = {http://www.cnn.com/2007/US/09/26/power.at.risk/index.html},
	Month = {September 26},
	Publisher = {CNN},
	Title = {Sources: Staged Cyber Attack Reveals Vulnerability in Power Grid},
	Year = {2007}}

@book{ftc,
	Author = {Mogens Blanke and Michel Kinnaert and Jan Lunze and Marcel Staroswiecki},
	Date-Added = {2007-09-30 15:16:11 -0700},
	Date-Modified = {2007-09-30 15:17:43 -0700},
	Address = {http://www.cnn.com/2007/US/09/26/power.at.risk/index.html},
	Month = {September 26},
	Publisher = {Springer-Verlag},
	Title = {Diagnosis and fault-tolerant control},
	Year = {2003}}



@Book{ColombiaEnergy2,
author = {CCTV},
title = {Colombian Rebels Continue Attacks on Energy Infrastructure},
publisher = {English Channel},
year = {2002},
address = {http://www.cctv.com/english/news/20020119/79688.html},
month = {January},
}
@Book{Colombiapipelines,
author = {AFP},
title = {Colombian rebels blow up key oil pipeline},
publisher = {Sydney Morning Herald},
year = {2003},
address = {http://www.smh.com.au/articles/2003/02/06/1044498917573.html},
month = {February},
}


@Book{Peterson,
author = {Ian R. Peterson and Andrey V. Savkin},
title = {Robust Kalman filtering for signals and systems with large uncertainties},
publisher = {Birkhuser, Boston},
year = {1999},
address = {http://www.smh.com.au/articles/2003/02/06/1044498917573.html},
month = {February},
}

%I.R. Petersen and A.V. Savkin. Robust Kalman Filtering for Signals and Systems with Large Uncertainties, , Boston (1999).



@Book{ColombiaEnergy,
ALTauthor = {BBC NEWS},
title = {Colombia Rebels Blast Power Pylons},
publisher = {BBC},
year = {2000},
address = {http://news.bbc.co.uk/2/hi/americas/607782.stm},
month = {January},
}
@InCollection{Colombia,
author = {D. Mej\'ia and C. E. Posada},
title = {Capital Destruction, Optimal Defense and Economic Growth},
booktitle = {Borradores Semanales de Econom\'ia},
publisher = {Banco de la Rep\'ublica},
year = {2003},
volume = {257},
address = {Bogot\'a},
month = {September},
}
