Pages that link to "Item:Q2982520"
From MaRDI portal
The following pages link to Optimal Denial-of-Service Attack Scheduling With Energy Constraint (Q2982520):
Displaying 25 items.
- Remote observer-based robust control for cyber-physical systems under asynchronous DoS attacks: an intelligent approach (Q5029108) (← links)
- Finite-time distributed resilient state estimation subject to hybrid cyber-attacks: a new dynamic event-triggered case (Q5046857) (← links)
- Design a robust quantitative feedback theory controller for cyber-physical systems: ship course control problem (Q5057764) (← links)
- Observer-based adaptive secure control with nonlinear gain recursive sliding-mode for networked non-affine nonlinear systems under DoS attacks (Q5122251) (← links)
- False data injection attack on consensus‐based distributed estimation (Q5283271) (← links)
- Security analysis and fault detection against stealthy replay attacks (Q5863736) (← links)
- Robust \(H_\infty\) filtering for semi-Markov jump systems encountering denial-of-service jamming attacks (Q6046499) (← links)
- Bumpless transfer distributed adaptive backstepping control of nonlinear multi-agent systems with circular filtering under DoS attacks (Q6049106) (← links)
- Optimal power control for sensors and DoS attackers over a fading channel network (Q6053826) (← links)
- Load frequency predictive control for power systems concerning wind turbine and communication delay (Q6054504) (← links)
- Periodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systems (Q6063765) (← links)
- Energy efficient management for distributed state estimation under DoS attacks (Q6071454) (← links)
- Vulnerability analysis of distributed state estimation under joint deception attacks (Q6073113) (← links)
- Design and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgrids (Q6074949) (← links)
- Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks (Q6082753) (← links)
- Optimal filter design for cyber‐physical systems under stealthy hybrid attacks (Q6083905) (← links)
- Optimal stealthy attack against stochastic event‐based scheduling for remote state estimation in cyber‐physical systems (Q6085138) (← links)
- Dynamic event‐triggered approach for networked control systems under denial of service attacks (Q6089905) (← links)
- Event-triggered control for second-order multi-agent systems under denial-of-service attacks and white noises (Q6099824) (← links)
- Whittle's index based sensor scheduling for multiprocess systems under DoS attacks (Q6130970) (← links)
- Identification of FIR systems with binary-valued observations against denial-of-service attacks (Q6160588) (← links)
- Optimal sensor scheduling for state estimation under limited channel resources (Q6177190) (← links)
- Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power (Q6197941) (← links)
- Optimal completely stealthy attacks against remote estimation in cyber-physical systems (Q6199483) (← links)
- Network steganography based security framework for cyber-physical systems (Q6203495) (← links)