scientific article; zbMATH DE number 6936864
From MaRDI portal
Publication:5375255
zbMath1395.68076MaRDI QIDQ5375255
Jiahu Qin, Menglin Li, Xinghuo Yu, Ling Shi
Publication date: 14 September 2018
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (52)
A secure clock synchronization scheme for wireless sensor networks against malicious attacks ⋮ Probability-guaranteed secure consensus control for time-varying stochastic multi-agent systems under mixed attacks ⋮ Stabilization of networked singular control systems under double-channel quantization and DoS attacks ⋮ Adaptive finite-time control for cyber-physical systems with injection and deception attacks ⋮ Dynamic event-triggered control for nonlinear NCSs subject to DoS attacks ⋮ Rollout approach to sensor scheduling for remote state estimation under integrity attack ⋮ Leaderless consensus control of uncertain multi-agents systems with sensor and actuator attacks ⋮ Defensive deception against reactive jamming attacks in remote state estimation ⋮ Optimizing DoS attack energy with imperfect acknowledgments and energy harvesting constraints in cyber-physical systems ⋮ Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol ⋮ Optimal power control for sensors and DoS attackers over a fading channel network ⋮ Finite‐time fault detection for nonlinear delayed system with dynamic quantization and multiple packet dropouts ⋮ Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint ⋮ Event-triggered resilient control for cyber-physical systems under periodic DoS jamming attacks ⋮ Dynamic event‐triggered approach for networked control systems under denial of service attacks ⋮ Event‐triggered model‐free adaptive control for nonlinear cyber‐physical systems with false data injection attacks ⋮ Security of networked control systems subject to deception attacks: a survey ⋮ Optimal stealthy attack with historical data on cyber-physical systems ⋮ Binary observation‐based FIR system identification under sequence denial of service attacks ⋮ Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks ⋮ Resilient quantized control for asynchronous sampled-data networked control systems under DoS attacks ⋮ Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method ⋮ Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems ⋮ Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks ⋮ Deep reinforcement learning control approach to mitigating actuator attacks ⋮ Optimal sensor scheduling for state estimation under limited channel resources ⋮ Optimal attack strategy against fault detectors for linear cyber-physical systems ⋮ Multi‐consensus recovery of multi‐agent system with cyber‐attack based on topology reconstruction controller ⋮ Predictive output feedback control of networked control system with Markov DoS attack and time delay ⋮ Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks ⋮ Optimal denial‐of‐service attack scheduling for remote state estimation with time‐varying interference power ⋮ Optimal completely stealthy attacks against remote estimation in cyber-physical systems ⋮ Network steganography based security framework for cyber-physical systems ⋮ False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach ⋮ Optimal denial-of-service attack energy management against state estimation over an SINR-based network ⋮ Observer-based adaptive secure control with nonlinear gain recursive sliding-mode for networked non-affine nonlinear systems under DoS attacks ⋮ Cloud-fog computing-based distributed event-triggered consensus predictive compensation for optimal energy management in microgrid under DoS attack ⋮ Event-triggered state estimation for networked control systems with lossy network communication ⋮ Consensus-based secondary frequency control under denial-of-service attacks of distributed generations for microgrids ⋮ Secure remote state estimation against linear man-in-the-middle attacks using watermarking ⋮ Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data ⋮ Optimal DoS attack scheduling for multi-sensor remote state estimation over interference channels ⋮ Adaptive control of cyber-physical systems under deception and injection attacks ⋮ Security control for two-time-scale cyber physical systems with multiple transmission channels under DoS attacks: the input-to-state stability ⋮ State estimation and event-triggered control for cyber-physical systems under malicious attack ⋮ Optimal sensor attacks in cyber-physical systems with round-robin protocol ⋮ Malicious adversaries against secure state estimation: Sparse sensor attack design ⋮ How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks ⋮ Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation ⋮ Quantized output feedback control for switched systems with DoS attacks and event-triggered sampling ⋮ Detection of stealthy false data injection attacks against cyber-physical systems: a stochastic coding scheme ⋮ Scaled consensus for multiagent systems under denial-of-service attacks and exogenous disturbance
This page was built for publication: