-
1
-
-
77953581925
-
Networked control system: Overview and research trends
-
Jul.
-
R. A. Gupta and M.-Y. Chow, "Networked control system: Overview and research trends," IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2527- 2535, Jul. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.7
, pp. 2527-2535
-
-
Gupta, R.A.1
Chow, M.-Y.2
-
2
-
-
50649118126
-
A modeling framework for evaluating effectiveness of smart-infrastructure crises management systems
-
May 12-13
-
T. Mukherjee and S. K. S. Gupta, "A modeling framework for evaluating effectiveness of smart-infrastructure crises management systems," in Proc. IEEE Conf. Technol. Homeland Security, May 12-13, 2008, pp. 549-554.
-
(2008)
Proc. IEEE Conf. Technol. Homeland Security
, pp. 549-554
-
-
Mukherjee, T.1
Gupta, S.K.S.2
-
3
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Jun. 17-20
-
A. A. Cardenas, S. Amin, and S. Sastry, "Secure control: Towards survivable cyber-physical systems," in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops, Jun. 17-20, 2008, pp. 495-500.
-
(2008)
Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops
, pp. 495-500
-
-
Cardenas, A.A.1
Amin, S.2
Sastry, S.3
-
4
-
-
33847299487
-
Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
Dec. 14-17
-
C.-H. Tsang and S. Kwong, "Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," in Proc. IEEE Int. Conf. Ind. Technol., Dec. 14-17, 2005, pp. 51-56.
-
(2005)
Proc. IEEE Int. Conf. Ind. Technol.
, pp. 51-56
-
-
Tsang, C.-H.1
Kwong, S.2
-
5
-
-
34548049800
-
Industrial cybersecurity for a power system and SCADA networks - Be secure
-
DOI 10.1109/MIA.2007.4283509
-
A. A. Creery and E. J. Byres, "Industrial cybersecurity for a power system and SCADA networks-Be secure," IEEE Ind. Appl. Mag., vol. 13, no. 4, pp. 49-55, Jul./Aug. 2007. (Pubitemid 47278233)
-
(2007)
IEEE Industry Applications Magazine
, vol.13
, Issue.4
, pp. 49-55
-
-
Creery, A.A.1
Byres, E.J.2
-
6
-
-
28444465910
-
Distributed device networks with security constraints
-
DOI 10.1109/TII.2005.843826
-
Y. Xu, R. Song, L. Korba, L. Wang, W. Shen, and S. Lang, "Distributed device networks with security constraints," IEEE Trans. Ind. Informat., vol. 1, no. 4, pp. 217-225, Nov. 2005. (Pubitemid 41729785)
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.4
, pp. 217-225
-
-
Xu, Y.1
Song, R.2
Korba, L.3
Wang, L.4
Shen, W.5
Lang, S.6
-
7
-
-
75449094444
-
A delay-tolerant potentialfield- based network implementation of an integrated navigation system
-
Feb.
-
R. A. Gupta, A. A. Masoud, and M.-Y. Chow, "A delay-tolerant potentialfield- based network implementation of an integrated navigation system," IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 769-783, Feb. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.2
, pp. 769-783
-
-
Gupta, R.A.1
Masoud, A.A.2
Chow, M.-Y.3
-
8
-
-
49949106761
-
Information security with real-time operation: Performance assessment for next generation wireless distributed networked-control-systems
-
Taipei, Taiwan, Nov. 5-8
-
R. A. Gupta, M.-Y. Chow, A. Agarwal, and W. Wang, "Information security with real-time operation: Performance assessment for next generation wireless distributed networked-control-systems," in Proc. 33rd Annu. Conf. IEEE Ind. Electron. Soc., Taipei, Taiwan, Nov. 5-8, 2007, pp. 420-425.
-
(2007)
Proc. 33rd Annu. Conf. IEEE Ind. Electron. Soc.
, pp. 420-425
-
-
Gupta, R.A.1
Chow, M.-Y.2
Agarwal, A.3
Wang, W.4
-
9
-
-
80052855909
-
A trade-off model for performance and security in secured networked control systems
-
Jun.
-
W. Zeng and M.-Y. Chow, "A trade-off model for performance and security in secured networked control systems," in Proc. IEEE ISIE, Gdansk, Poland, Jun. 2011, pp. 1997-2002.
-
(2011)
Proc. IEEE ISIE, Gdansk, Poland
, pp. 1997-2002
-
-
Zeng, W.1
Chow, M.-Y.2
-
10
-
-
0034153728
-
Cooperative coevolution: An architecture for evolving coadapted subcomponents
-
Mar.
-
M. A. Potter and K. A. De Jong, "Cooperative coevolution: An architecture for evolving coadapted subcomponents," J. Evol. Comput., vol. 8, no. 1, pp. 1-29, Mar. 2000.
-
(2000)
J. Evol. Comput.
, vol.8
, Issue.1
, pp. 1-29
-
-
Potter, M.A.1
De Jong, K.A.2
-
11
-
-
0001473907
-
Evolving complex structures via cooperative coevolution
-
Cambridge, MA
-
K. A. De Jong andM. A. Potter, "Evolving complex structures via cooperative coevolution," in Proc. 4th Annu. Conf. Evol. Program., Cambridge, MA, 1995, pp. 307-317.
-
(1995)
Proc. 4th Annu. Conf. Evol. Program.
, pp. 307-317
-
-
De Jong, K.A.1
Potter, M.A.2
-
12
-
-
7244246137
-
-
Ph.D. dissertation, George Mason Univ., Fairfax, VA
-
R. P. Wiegand, "An analysis of cooperative coevolutionary algorithms," Ph.D. dissertation, George Mason Univ., Fairfax, VA, 2003.
-
(2003)
An Analysis of Cooperative Coevolutionary Algorithms
-
-
Wiegand, R.P.1
-
13
-
-
32144448677
-
Analyzing oligopolistic electricity market using coevolutionary computation
-
DOI 10.1109/TPWRS.2005.862005
-
H. Chen, K. P. Wong, D. H. M. Nguyen, and C. Y. Chung, "Analyzing oligopoly electricity market using coevolutionary computation," IEEE Trans. Power Syst., vol. 21, no. 1, pp. 143-152, Feb. 2006. (Pubitemid 43204713)
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.1
, pp. 143-152
-
-
Chen, H.1
Wong, K.P.2
Nguyen, D.H.M.3
Chung, C.Y.4
-
14
-
-
78649592666
-
Strategic bidding in a day-ahead market by coevolutionary genetic algorithms
-
Jul. 25-29
-
F. Careri, C. Genesi, P. Marannino, M. Montagna, S. Rossi, and I. Siviero, "Strategic bidding in a day-ahead market by coevolutionary genetic algorithms," in Proc. IEEE Power Energy Soc. Gen. Meeting, Jul. 25-29, 2010, pp. 1-8.
-
(2010)
Proc. IEEE Power Energy Soc. Gen. Meeting
, pp. 1-8
-
-
Careri, F.1
Genesi, C.2
Marannino, P.3
Montagna, M.4
Rossi, S.5
Siviero, I.6
-
15
-
-
44149107915
-
Coevolution of terrorist and security scenarios for water distribution systems
-
Oct.
-
Z. Skolicki, T. Arciszewski, M. H. Houck, and K. A. De Jong, "Coevolution of terrorist and security scenarios for water distribution systems," J. Adv. Eng. Softw., vol. 39, no. 10, pp. 801-811, Oct. 2008.
-
(2008)
J. Adv. Eng. Softw.
, vol.39
, Issue.10
, pp. 801-811
-
-
Skolicki, Z.1
Arciszewski, T.2
Houck, M.H.3
De Jong, K.A.4
-
16
-
-
70049103826
-
Optimal stabilizing gain selection for networked control systems with time delays and packet losses
-
Sep.
-
H. Li, M.-Y. Chow, and Z. Sun, "Optimal stabilizing gain selection for networked control systems with time delays and packet losses," IEEE Trans. Control Syst. Technol., vol. 17, no. 5, pp. 1154-1162, Sep. 2009.
-
(2009)
IEEE Trans. Control Syst. Technol.
, vol.17
, Issue.5
, pp. 1154-1162
-
-
Li, H.1
Chow, M.-Y.2
Sun, Z.3
-
17
-
-
66149117916
-
EDA-based speed control of a networked DC motor system with time delays and packet losses
-
May
-
H. Li,M.-Y. Chow, and Z. Sun, "EDA-based speed control of a networked DC motor system with time delays and packet losses," IEEE Trans. Ind. Electron., vol. 56, no. 5, pp. 1727-1735, May 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.5
, pp. 1727-1735
-
-
Li, H.1
Chow, M.-Y.2
Sun, Z.3
-
18
-
-
0004216472
-
-
Englewood Cliffs, NJ: Prentice-Hall
-
C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in a Public World. Englewood Cliffs, NJ: Prentice-Hall, 1995, p. 504.
-
(1995)
Network Security: Private Communication in A Public World
, pp. 504
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
19
-
-
63149119832
-
Performance assessment and compensation for secure networked control systems
-
Nov. 10-13
-
R. A. Gupta and M.-Y. Chow, "Performance assessment and compensation for secure networked control systems," in Proc. 34th Annu. Conf. IEEE Ind. Electron., Nov. 10-13, 2008, pp. 2929-2934.
-
(2008)
Proc. 34th Annu. Conf. IEEE Ind. Electron.
, pp. 2929-2934
-
-
Gupta, R.A.1
Chow, M.-Y.2
-
20
-
-
70449501104
-
An adaptive tradeoff model for service performance and security in service-based systems
-
Jul. 6-10
-
S. S. Yau, Y. Yin, and H. G. An, "An adaptive tradeoff model for service performance and security in service-based systems," in Proc. IEEE Int. Conf. Web Services, Jul. 6-10, 2009, pp. 287-294.
-
(2009)
Proc. IEEE Int. Conf. Web Services
, pp. 287-294
-
-
Yau, S.S.1
Yin, Y.2
An, H.G.3
-
21
-
-
36248956628
-
Opportunistic encryption: A trade-off between security and throughput in wireless networks
-
DOI 10.1109/TDSC.2007.70214
-
M. A. Haleem, C. N. Mathur, R. Chandramouli, and K. P. Subbalakshmi, "Opportunistic encryption: A trade-off between security and throughput in wireless networks," IEEE Trans. Dependable Secure Comput., vol. 4, no. 4, pp. 313-324, Oct.-Dec. 2007. (Pubitemid 350125896)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 313-324
-
-
Haleem, M.A.1
Mathur, C.N.2
Chandramouli, R.3
Subbalakshmi, K.P.4
-
22
-
-
59749105367
-
A competitive-cooperative coevolutionary paradigm for dynamic multi-objective optimization
-
Feb.
-
C. K. Goh and K. C. Tan, "A competitive-cooperative coevolutionary paradigm for dynamic multi-objective optimization," IEEE Trans. Evol. Comput., vol. 13, no. 1, pp. 103-127, Feb. 2009.
-
(2009)
IEEE Trans. Evol. Comput.
, vol.13
, Issue.1
, pp. 103-127
-
-
Goh, C.K.1
Tan, K.C.2
-
23
-
-
82855171515
-
Performance evaluation of a PHEV parking station using particle swarm optimization
-
Detroit, MI, Jul. 24-29
-
W. Su and M.-Y. Chow, "Performance evaluation of a PHEV parking station using particle swarm optimization," in Proc. IEEE Power Energy Soc. Gen. Meeting, Detroit, MI, Jul. 24-29, 2011, pp. 1-6.
-
(2011)
Proc. IEEE Power Energy Soc. Gen. Meeting
, pp. 1-6
-
-
Su, W.1
Chow, M.-Y.2
|