-
4
-
-
77953044026
-
Stealthy deception attacks on water SCADA systems
-
Stockholm, Sweden
-
S. Amin, X. Litrico, S. Sastry, and A. M. Bayen. Stealthy deception attacks on water SCADA systems. In Proceedings of the 13th ACM International Conference on Hybrid systems: Computation and Control, pages 161-170, Stockholm, Sweden, 2010.
-
(2010)
Proceedings of the 13th ACM International Conference on Hybrid Systems: Computation and Control
, pp. 161-170
-
-
Amin, S.1
Litrico, X.2
Sastry, S.3
Bayen, A.M.4
-
6
-
-
0036027604
-
The explicit linear quadratic regulator for constrained systems
-
DOI 10.1016/S0005-1098(01)00174-1, PII S0005109801001741
-
A. Bemporad, M. Morari, V. Dua, and E.N. Pistikopoulos. The explicit linear quadratic regulator for constrained systems. Automatica, 38:3-20, 2002. (Pubitemid 33034535)
-
(2002)
Automatica
, vol.38
, Issue.1
, pp. 3-20
-
-
Bemporad, A.1
Morari, M.2
Dua, V.3
Pistikopoulos, E.N.4
-
7
-
-
0034539419
-
Stability of networked control systems: Explicit analysis of delay
-
Chicago, USA
-
M.S. Branicky, S.M. Phillips, and W. Zhang. Stability of networked control systems: explicit analysis of delay. In Proceedings of American Control Conference, pages 2352-2357, Chicago, USA, 2000.
-
(2000)
Proceedings of American Control Conference
, pp. 2352-2357
-
-
Branicky, M.S.1
Phillips, S.M.2
Zhang, W.3
-
10
-
-
79953130034
-
Optimal control in the presence of an intelligient jammer with limited actions
-
Atlanta, USA, December
-
A. Gupta, C. Langbort, and T. Basar. Optimal control in the presence of an intelligient jammer with limited actions. In IEEE Conf. on Decision and Control, pages 1096-1101, Atlanta, USA, December 2010.
-
(2010)
IEEE Conf. on Decision and Control
, pp. 1096-1101
-
-
Gupta, A.1
Langbort, C.2
Basar, T.3
-
11
-
-
64149124758
-
A survey of recent results in networked control systems
-
J. Hespanha, P. Naghshtabrizi, and Y. Xu. A survey of recent results in networked control systems. Proceddings of IEEE Special Issue on Technology of Networked Control Systems, 95(1):138-162, 2007.
-
(2007)
Proceddings of IEEE Special Issue on Technology of Networked Control Systems
, vol.95
, Issue.1
, pp. 138-162
-
-
Hespanha, J.1
Naghshtabrizi, P.2
Xu, Y.3
-
12
-
-
0033876326
-
Constrained model predictive control: Stability and optimality
-
D. Q. Mayne, J. B. Rawlings, C. V. Rao, and P. O. M. Scokaert. Constrained model predictive control: stability and optimality. Automatica, 36:789-814, 2000.
-
(2000)
Automatica
, vol.36
, pp. 789-814
-
-
Mayne, D.Q.1
Rawlings, J.B.2
Rao, C.V.3
Scokaert, P.O.M.4
-
13
-
-
0020205067
-
Upper and lower bounds for the solution to the discrete Lyapunov matrix equation
-
T. Mori, N. Fukuma, and M. Kuwahara. Upper and lower bounds for the solution to the discrete Lyapunov matrix equation. International Journal of Control, 36:889-892, 1982.
-
(1982)
International Journal of Control
, vol.36
, pp. 889-892
-
-
Mori, T.1
Fukuma, N.2
Kuwahara, M.3
-
14
-
-
4644244256
-
Topological feedback entropy and nonlinear stabilization
-
G. N. Nair, R. J. Evans, I. M. Y. Mareels, and W. Moran. Topological feedback entropy and nonlinear stabilization. IEEE Transactions on Automatic Control, 49(9):1585-1597, 2004.
-
(2004)
IEEE Transactions on Automatic Control
, vol.49
, Issue.9
, pp. 1585-1597
-
-
Nair, G.N.1
Evans, R.J.2
Mareels, I.M.Y.3
Moran, W.4
-
15
-
-
7244224694
-
Input-output stability properties of networked control systems
-
D. Nesic and A. Teel. Input-output stability properties of networked control systems. IEEE Transactions on Automatic Control, 49(10):1650-1667, 2004.
-
(2004)
IEEE Transactions on Automatic Control
, vol.49
, Issue.10
, pp. 1650-1667
-
-
Nesic, D.1
Teel, A.2
-
16
-
-
79953159101
-
Identifying cyber attacks under local model information
-
To appear
-
F. Pasqualetti, R. Carli, A. Bicchi, and F. Bullo. Identifying cyber attacks under local model information. In IEEE Conf. on Decision and Control, Atlanta, GA, USA, December 2010. To appear.
-
IEEE Conf. on Decision and Control, Atlanta, GA, USA, December 2010
-
-
Pasqualetti, F.1
Carli, R.2
Bicchi, A.3
Bullo, F.4
-
17
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry. Foundations of control and estimation over lossy networks. Proceddings of IEEE Special Issue on Technology of Networked Control Systems, 95(1):163-187, 2007.
-
(2007)
Proceddings of IEEE Special Issue on Technology of Networked Control Systems
, vol.95
, Issue.1
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.S.5
-
18
-
-
52449121020
-
Distributed function calculation via linear iterations in the presence of malicious agents - Parts I, II
-
June
-
S. Sundaram and C. N. Hadjicostis. Distributed function calculation via linear iterations in the presence of malicious agents - parts I, II. In American Control Conference, pages 1350-1362, June 2008.
-
(2008)
American Control Conference
, pp. 1350-1362
-
-
Sundaram, S.1
Hadjicostis, C.N.2
|