Pages that link to "Item:Q3384351"
From MaRDI portal
The following pages link to Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems (Q3384351):
Displaying 33 items.
- Attack allocation on remote state estimation in multi-systems: structural results and asymptotic solution (Q680517) (← links)
- A nonlinear systems framework for cyberattack prevention for chemical process control systems (Q1634518) (← links)
- Detection and mitigation of biasing attacks on distributed estimation networks (Q1716683) (← links)
- Switched projected gradient descent algorithms for secure state estimation under sparse sensor attacks (Q1737875) (← links)
- A data-driven covert attack strategy in the closed-loop cyber-physical systems (Q1796672) (← links)
- Unknown source in spatially distributed systems: identifiability analysis and estimation (Q2063787) (← links)
- Usability aware secret protection with minimum cost (Q2074757) (← links)
- Incentive-based fault tolerant control of evolutionary matrix games (Q2094089) (← links)
- Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach (Q2139375) (← links)
- Adaptive finite-time control for cyber-physical systems with injection and deception attacks (Q2148093) (← links)
- Adaptive dynamic programming for security of networked control systems with actuator saturation (Q2198197) (← links)
- A secure control mechanism for network environments (Q2217568) (← links)
- Cyber attack estimation and detection for cyber-physical power systems (Q2242682) (← links)
- Security-based resilient event-triggered control of networked control systems under denial of service attacks (Q2278330) (← links)
- Cyber-attacks and faults reconstruction using finite time convergent observation algorithms: electric power network application (Q2291054) (← links)
- Resilient synchronization of distributed multi-agent systems under attacks (Q2307557) (← links)
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs (Q2409156) (← links)
- Adaptive dual-layer super-twisting sliding mode observers to reconstruct and mitigate disturbances and communication attacks in power networks (Q2665149) (← links)
- Byzantine-resilient distributed state estimation: a min-switching approach (Q2665157) (← links)
- Resilience to denial-of-service and integrity attacks: a structured systems approach (Q2667478) (← links)
- Differential initial-value privacy and observability of linear dynamical systems (Q2682283) (← links)
- Output-sensitive event-triggered path following control of autonomous ground vehicles under stochastic FDI attacks (Q2684651) (← links)
- Control Systems Under Attack: The Securable and Unsecurable Subspaces of a Linear Stochastic System (Q4625780) (← links)
- Dynamic model predictive control for constrained cyber-physical systems subject to actuator attacks (Q5028011) (← links)
- Resilient control of cyber‐physical systems under sensor and actuator attacks driven by adaptive sliding mode observer (Q6071517) (← links)
- Distributed infinite‐horizon optimal control of continuous‐time linear systems over network (Q6089857) (← links)
- Estimating pollution spread in water networks as a Schrödinger bridge problem with partial information (Q6092452) (← links)
- Quickest physical watermarking-based detection of measurement replacement attacks in networked control systems (Q6099932) (← links)
- Optimal resilient sensor placement problem for secure state estimation (Q6152574) (← links)
- Neural‐network‐based event‐triggered adaptive security path following control of autonomous ground vehicles subject to abnormal actuator signal (Q6194704) (← links)
- A stealthy man-in-the-middle attack strategy for switched systems (Q6544841) (← links)
- Data-driven attack policy design for cyber-physical systems under channel constraints (Q6564934) (← links)
- Resilient control of cyber-physical systems using adaptive super-twisting observer (Q6580987) (← links)