Pages that link to "Item:Q1939623"
From MaRDI portal
The following pages link to Security of interdependent and identical networked control systems (Q1939623):
Displaying 38 items.
- Security in \(H_2\)-sense for polytopic uncertain systems with attacks based on model predictive control (Q325848) (← links)
- Recent advances on filtering and control for cyber-physical systems under security and resource constraints (Q328147) (← links)
- Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks (Q518321) (← links)
- Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks (Q681196) (← links)
- \(H_\infty\) filtering for networked systems with hybrid-triggered communication mechanism and stochastic cyber attacks (Q682725) (← links)
- Antagonistic control (Q730107) (← links)
- Non-fragile consensus control for nonlinear multi-agent systems with uniform quantizations and deception attacks via output feedback approach (Q783470) (← links)
- Fuzzy-logic-based control, filtering, and fault detection for networked systems: a survey (Q1665965) (← links)
- Composite control of linear quadratic games in delta domain with disturbance observers (Q1691164) (← links)
- Bayesian adversarial multi-node bandit for optimal smart grid protection against cyber attacks (Q2021298) (← links)
- Nash equilibrium seeking in quadratic noncooperative games under two delayed information-sharing schemes (Q2055354) (← links)
- Event-triggered \(H_\infty\) control of networked switched systems subject to denial-of-service attacks (Q2061186) (← links)
- Voluntary defense strategy and quantized sample-data control for T-S fuzzy networked control systems with stochastic cyber-attacks and its application (Q2113715) (← links)
- Adaptive finite-time control for cyber-physical systems with injection and deception attacks (Q2148093) (← links)
- Improved distributed event-triggered control for networked control system under random cyberattacks via Bessel-Legendre inequalities (Q2173695) (← links)
- Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks (Q2181388) (← links)
- Game theoretical security detection strategy for networked systems (Q2195399) (← links)
- Adaptive dynamic programming for security of networked control systems with actuator saturation (Q2198197) (← links)
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach (Q2203055) (← links)
- Strategic sensor placement on graphs (Q2242964) (← links)
- Event-triggered sliding mode control of uncertain switched systems under denial-of-service attacks (Q2278962) (← links)
- Securing infrastructure facilities: when does proactive defense help? (Q2292114) (← links)
- MPC-based defense strategy for distributed networked control systems under DoS attacks (Q2327378) (← links)
- A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks (Q2338198) (← links)
- Non-fragile hybrid-triggered control of networked positive switched systems with cyber attacks (Q2668316) (← links)
- Sliding mode control for discrete-time systems with randomly occurring uncertainties and nonlinearities under hybrid cyber attacks (Q2700461) (← links)
- Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks (Q2817109) (← links)
- On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks (Q2817115) (← links)
- A game-theoretic method for resilient control design in industrial multi-agent CPSs with Markovian and coupled dynamics (Q5012648) (← links)
- Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks (Q5028036) (← links)
- Event-triggered control of cyber-physical systems under asynchronous denial of service attacks (Q5122255) (← links)
- Vulnerability analysis of distributed state estimation under joint deception attacks (Q6073113) (← links)
- Secure sliding mode control of interval type‐2 fuzzy systems against intermittent denial‐of‐service attacks (Q6089841) (← links)
- Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks (Q6160768) (← links)
- A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems (Q6164035) (← links)
- Identification and analysis of stochastic deception attacks on cyber-physical systems (Q6542601) (← links)
- Security-aware optimal actuator placement in vehicle platooning (Q6578838) (← links)
- Event-based switching control for networked switched systems under nonperiodic DoS jamming attacks (Q6611549) (← links)