Pages that link to "Item:Q4562289"
From MaRDI portal
The following pages link to False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis (Q4562289):
Displaying 30 items.
- SINR-based multi-channel power schedule under DoS attacks: a Stackelberg game approach with incomplete information (Q1737646) (← links)
- Optimal stealthy integrity attacks on remote state estimation: the maximum utilization of historical data (Q2021302) (← links)
- Observer-based distributed fault detection and isolation for second-order multi-agent systems using relative information (Q2027423) (← links)
- Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks (Q2056370) (← links)
- Optimal sensor attacks in cyber-physical systems with round-robin protocol (Q2056371) (← links)
- Switching defence for switched systems under malicious attacks: a Stackelberg game approach (Q2060882) (← links)
- Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation (Q2063783) (← links)
- Online routing for smart electricity network under hybrid uncertainty (Q2081833) (← links)
- Adaptive finite-time control for cyber-physical systems with injection and deception attacks (Q2148093) (← links)
- Performance guaranteed attack reconstruction for cyber-physical systems: a new intermediate estimator-based framework (Q2151903) (← links)
- False data injection attacks with complete stealthiness in cyber-physical systems: a self-generated approach (Q2203055) (← links)
- Hierarchical structures and leadership design in mean-field-type games with polynomial cost (Q2221282) (← links)
- Optimal \(\epsilon\)-stealthy attack in cyber-physical systems (Q2224736) (← links)
- Secure analysis of dynamic networks under pinning attacks against synchronization (Q2288587) (← links)
- Stackelberg population dynamics: a predictive-sensitivity approach (Q2669134) (← links)
- Switched Stackelberg game analysis of false data injection attacks on networked control systems (Q5122248) (← links)
- Stealthy multiplicative attacks against cyber‐physical systems: A gap metric approach (Q6069272) (← links)
- Denial-of-service attacks on cyber-physical systems with two-hop networks under round-robin protocol (Q6084723) (← links)
- Event‐based resilience to DoS attacks on communication for consensus of networked Lagrangian systems (Q6089839) (← links)
- False data injection attacks on sensors against state estimation in cyber-physical systems (Q6099893) (← links)
- Hierarchical Nash equilibrium seeking strategies of quadratic time‐varying games with Euler–Lagrange players (Q6117462) (← links)
- Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach (Q6122280) (← links)
- Multi‐stage dynamic event‐triggered containment control of nonlinear multi‐agent systems with input‐bounded leaders and time‐varying delay (Q6136631) (← links)
- Dynamic‐estimator‐based adaptive secure containment control for constrained nonlinear multi‐agent systems under denial‐of‐service attacks (Q6136635) (← links)
- Robust self‐triggered control for nonlinear cyber‐physical systems with state constraints under DoS attacks (Q6149780) (← links)
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems (Q6154461) (← links)
- Observer‐based security control for distributed cyber‐physical systems under replay attacks (Q6154702) (← links)
- Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks (Q6160768) (← links)
- Differential privacy optimal control with asymmetric information structure (Q6180332) (← links)
- Adaptive optimal formation control for unmanned surface vehicles with guaranteed performance using actor‐critic learning architecture (Q6190418) (← links)