A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
From MaRDI portal
(Redirected from Publication:694835)
Recommendations
- Global dynamics and control of malicious signal transmission in wireless sensor networks
- Exploring the behavior of malware propagation on mobile wireless sensor networks: stability and control analysis
- Resilient stabilization of multi-hop control networks subject to malicious attacks
- A probabilistic characterization of random and malicious communication failures in multi-hop networked control
- Networked Control Under Random and Malicious Packet Losses
- Adversarial control in a delay tolerant network
- Security control of networked systems with deception attacks and packet dropouts: a discrete-time approach
- Reputation-based networked control with data-corrupting channels
- Security and infiltration of networks: A structural controllability and observability perspective
- The Wireless Control Network: A New Approach for Control Over Networks
Cites work
- scientific article; zbMATH DE number 996442 (Why is no real title available?)
- scientific article; zbMATH DE number 5129494 (Why is no real title available?)
- scientific article; zbMATH DE number 5454271 (Why is no real title available?)
- scientific article; zbMATH DE number 3563783 (Why is no real title available?)
- Broadcast in radio networks tolerating Byzantine adversarial behavior
- Coding for Errors and Erasures in Random Network Coding
- Consensus Computation in Unreliable Networks: A System Theoretic Approach
- Consensus and Cooperation in Networked Multi-Agent Systems
- Dissemination of information in communication networks. Broadcasting, gossiping, leader election, and fault-tolerance.
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Distributed asynchronous deterministic and stochastic gradient optimization algorithms
- Generic properties and control of linear structured systems: A survey
- Research on system zeros: a survey
- Resilient Network Coding in the Presence of Byzantine Adversaries
- Strong detectability and observers
Cited in
(2)
This page was built for publication: A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q694835)