-
1
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
Jan.
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, "Foundations of control and estimation over lossy networks," Proc. of the IEEE, vol. 95, no. 1, pp. 163-187, Jan. 2007.
-
(2007)
Proc. of the IEEE
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.S.5
-
2
-
-
64149124758
-
A survey of recent results in networked control systems
-
Jan.
-
J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, "A survey of recent results in networked control systems," Proc. of the IEEE, vol. 95, no. 1, pp. 138-162, Jan. 2007.
-
(2007)
Proc. of the IEEE
, vol.95
, Issue.1
, pp. 138-162
-
-
Hespanha, J.P.1
Naghshtabrizi, P.2
Xu, Y.3
-
3
-
-
68949173803
-
Data transmission over networks for estimation and control
-
Aug.
-
V. Gupta, A. F. Dana, J. Hespanha, R. M. Murray, and B. Hassibi, "Data transmission over networks for estimation and control," IEEE Transactions on Automatic Control, vol. 54, no. 8, pp. 1807-1819, Aug. 2009.
-
(2009)
IEEE Transactions on Automatic Control
, vol.54
, Issue.8
, pp. 1807-1819
-
-
Gupta, V.1
Dana, A.F.2
Hespanha, J.3
Murray, R.M.4
Hassibi, B.5
-
4
-
-
79953138181
-
The Wireless Control Network: Synthesis and Robustness
-
M. Pajic, S. Sundaram, J. Le Ny, R. Mangharam, and G. J. Pappas, "The Wireless Control Network: Synthesis and Robustness," in Proc. of the 49th IEEE Conference on Decision and Control, 2010.
-
Proc. of the 49th IEEE Conference on Decision and Control, 2010
-
-
Pajic, M.1
Sundaram, S.2
Le Ny, J.3
Mangharam, R.4
Pappas, G.J.5
-
5
-
-
62749205479
-
Distributed intrusion detection for secure consensus computations
-
F. Pasqualetti, A. Bicchi, and F. Bullo, "Distributed intrusion detection for secure consensus computations," in Proc. of the 46th IEEE Conference on Decision and Control, 2007, pp. 5594-5599.
-
Proc. of the 46th IEEE Conference on Decision and Control, 2007
, pp. 5594-5599
-
-
Pasqualetti, F.1
Bicchi, A.2
Bullo, F.3
-
6
-
-
77954796687
-
A testbed for secure and robust SCADA systems
-
A. Giani, G. Karsai, T. Roosta, A. Shah, B. Sinopoli, and J. Wiley, "A testbed for secure and robust SCADA systems," in Proc. of the 14th IEEE Real-time and Embedded Technology and Applications Symposium, 2008, pp. 1-4.
-
Proc. of the 14th IEEE Real-time and Embedded Technology and Applications Symposium, 2008
, pp. 1-4
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
7
-
-
52449121020
-
Distributed function calculation via linear iterations in the presence of malicious agents
-
S. Sundaram and C. N. Hadjicostis, "Distributed function calculation via linear iterations in the presence of malicious agents," in Proc. of the American Control Conference, 2008, pp. 1350-1361.
-
(2008)
Proc. of the American Control Conference
, pp. 1350-1361
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
8
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Heidelberg: Springer-Verlag
-
S. Amin, A. A. Cárdenas, and S. S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in HSCC '09: Proc. of the 12th International Conference on Hybrid Systems: Computation and Control. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 31-45.
-
(2009)
HSCC '09: Proc. of the 12th International Conference on Hybrid Systems: Computation and Control. Berlin
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.A.2
Sastry, S.S.3
-
9
-
-
55549116194
-
-
National Institute of Standards and Technology, Tech. Rep. 800-82, Sep.
-
K. Stouffer, J. Falco, and K. Scarfone, "Guide to industrial control systems (ICS) security," National Institute of Standards and Technology, Tech. Rep. 800-82, Sep. 2008.
-
(2008)
Guide to Industrial Control Systems (ICS) Security
, vol.800
, Issue.82
-
-
Stouffer, K.1
Falco, J.2
Scarfone, K.3
-
11
-
-
67650679664
-
An intrusion detection system for wireless process control systems
-
T. Roosta, D. K. Nilsson, U. Lindqvist, and A. Valdes, "An intrusion detection system for wireless process control systems," in Proc. of the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, pp. 866-872.
-
Proc. of the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008
, pp. 866-872
-
-
Roosta, T.1
Nilsson, D.K.2
Lindqvist, U.3
Valdes, A.4
-
12
-
-
0003736078
-
-
Prentice-Hall Inc., Upper Saddle River, New Jersey
-
D. B. West, Introduction to Graph Theory. Prentice-Hall Inc., Upper Saddle River, New Jersey, 2001.
-
(2001)
Introduction to Graph Theory
-
-
West, D.B.1
-
13
-
-
0001147388
-
Invertibility of linear time-invariant dynamical systems
-
Apr.
-
M. K. Sain and J. L. Massey, "Invertibility of linear time-invariant dynamical systems," IEEE Transactions on Automatic Control, vol. AC-14, no. 2, pp. 141-149, Apr. 1969.
-
(1969)
IEEE Transactions on Automatic Control
, vol.AC-14
, Issue.2
, pp. 141-149
-
-
Sain, M.K.1
Massey, J.L.2
-
14
-
-
0016072039
-
On the invertibility of linear systems
-
June
-
A. S. Willsky, "On the invertibility of linear systems," IEEE Transactions on Automatic Control, vol. 19, no. 2, pp. 272-274, June 1974.
-
(1974)
IEEE Transactions on Automatic Control
, vol.19
, Issue.2
, pp. 272-274
-
-
Willsky, A.S.1
-
15
-
-
0038516887
-
Generic properties and control of linear structured systems: A survey
-
July
-
J.-M. Dion, C. Commault, and J. van der Woude, "Generic properties and control of linear structured systems: a survey," Automatica, vol. 39, no. 7, pp. 1125-1144, July 2003.
-
(2003)
Automatica
, vol.39
, Issue.7
, pp. 1125-1144
-
-
Dion, J.-M.1
Commault, C.2
Van Der Woude, J.3
-
16
-
-
0026068441
-
A graph-theoretic characterization for the rank of the transfer matrix of a structured system
-
Mar.
-
J. W. van der Woude, "A graph-theoretic characterization for the rank of the transfer matrix of a structured system," Mathematics of Control, Signals and Systems, vol. 4, no. 1, pp. 33-40, Mar. 1991.
-
(1991)
Mathematics of Control, Signals and Systems
, vol.4
, Issue.1
, pp. 33-40
-
-
Van Der Woude, J.W.1
-
17
-
-
43349106879
-
Distributed function calculation and consensus using linear iterative strategies
-
May
-
S. Sundaram and C. N. Hadjicostis, "Distributed function calculation and consensus using linear iterative strategies," IEEE Journal on Selected Areas in Communications: Special Issue on Control and Communications, vol. 26, no. 4, pp. 650-660, May 2008.
-
(2008)
IEEE Journal on Selected Areas in Communications: Special Issue on Control and Communications
, vol.26
, Issue.4
, pp. 650-660
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
18
-
-
45249101743
-
Resilient network coding in the presence of Byzantine adverseries
-
June
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, M. Médard, and M. Effros, "Resilient network coding in the presence of Byzantine adverseries," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2596-2603, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2596-2603
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Médard, M.6
Effros, M.7
-
19
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
Aug.
-
R. Koetter and F. R. Kschischang, "Coding for errors and erasures in random network coding," IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3579-3591, Aug. 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.R.2
|