메뉴 건너뛰기




Volumn , Issue , 2011, Pages 6624-6629

Attack-resilient distributed formation control via online adaptation

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL ENGINEERING;

EID: 84860664369     PISSN: 07431546     EISSN: 25762370     Source Type: Conference Proceeding    
DOI: 10.1109/CDC.2011.6161327     Document Type: Conference Paper
Times cited : (32)

References (38)
  • 2
  • 4
    • 84860656628 scopus 로고    scopus 로고
    • Security of interdependent and identical networked control systems
    • July submitted
    • S. Amin, G. A. Schwartz, and S. S. Sastry. Security of interdependent and identical networked control systems. Automatica, July 2010. submitted.
    • (2010) Automatica
    • Amin, S.1    Schwartz, G.A.2    Sastry, S.S.3
  • 6
    • 80053154055 scopus 로고    scopus 로고
    • Risk-sensitive control under a class of denial-of-service attack models
    • San Francisco, USA, June
    • G.K. Befekadu, V. Gupta, and P.J. Antsaklis. Risk-sensitive control under a class of denial-of-service attack models. In American Control Conference, pages 643-648, San Francisco, USA, June 2011.
    • (2011) American Control Conference , pp. 643-648
    • Befekadu, G.K.1    Gupta, V.2    Antsaklis, P.J.3
  • 7
    • 77957771173 scopus 로고    scopus 로고
    • Game-theoretic analysis of an aerial jamming attack on a UAV communication network
    • Baltimore, USA, June
    • S. Bhattacharya and T. Basar. Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In American Control Conference, pages 818-823, Baltimore, USA, June 2010.
    • (2010) American Control Conference , pp. 818-823
    • Bhattacharya, S.1    Basar, T.2
  • 8
    • 79953128168 scopus 로고    scopus 로고
    • Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer
    • Atlanta, USA, December
    • S. Bhattacharya and T. Basar. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer. In IEEE Conf. on Decision and Control, pages 3560-3565, Atlanta, USA, December 2010.
    • (2010) IEEE Conf. on Decision and Control , pp. 3560-3565
    • Bhattacharya, S.1    Basar, T.2
  • 12
    • 55549122339 scopus 로고    scopus 로고
    • Reaching a consensus in a dynamically changing environment - Convergence rates, measurement delays and asynchronous events
    • M. Cao, A. S. Morse, and B. D. O. Anderson. Reaching a consensus in a dynamically changing environment - convergence rates, measurement delays and asynchronous events. SIAM Journal on Control and Optimization, 47(2):601-623, 2008.
    • (2008) SIAM Journal on Control and Optimization , vol.47 , Issue.2 , pp. 601-623
    • Cao, M.1    Morse, A.S.2    Anderson, B.D.O.3
  • 13
    • 70449678609 scopus 로고    scopus 로고
    • Global and robust formation-shape stabilization of relative sensing networks
    • J. Cortés. Global and robust formation-shape stabilization of relative sensing networks. Automatica, 45(12):2754-2762, 2009.
    • (2009) Automatica , vol.45 , Issue.12 , pp. 2754-2762
    • Cortés, J.1
  • 14
    • 33144484176 scopus 로고    scopus 로고
    • Distributed receding horizon control for multi-vehicle formation stabilization
    • W. B. Dunbar and R. M. Murray. Distributed receding horizon control for multi-vehicle formation stabilization. Automatica, 42(4):549-558, 2006.
    • (2006) Automatica , vol.42 , Issue.4 , pp. 549-558
    • Dunbar, W.B.1    Murray, R.M.2
  • 16
    • 79953130034 scopus 로고    scopus 로고
    • Optimal control in the presence of an intelligient jammer with limited actions
    • Atlanta, USA, December
    • A. Gupta, C. Langbort, and T. Basar. Optimal control in the presence of an intelligient jammer with limited actions. In IEEE Conf. on Decision and Control, pages 1096-1101, Atlanta, USA, December 2010.
    • (2010) IEEE Conf. on Decision and Control , pp. 1096-1101
    • Gupta, A.1    Langbort, C.2    Basar, T.3
  • 17
    • 75449096947 scopus 로고    scopus 로고
    • On stability in the presence of analog erasure channels between controller and actuator
    • V. Gupta and N. Martins. On stability in the presence of analog erasure channels between controller and actuator. IEEE Transactions on Automatic Control, 55(1):175-179, 2010.
    • (2010) IEEE Transactions on Automatic Control , vol.55 , Issue.1 , pp. 175-179
    • Gupta, V.1    Martins, N.2
  • 18
    • 0038548185 scopus 로고    scopus 로고
    • Coordination of groups of mobile autonomous agents using nearest neighbor rules
    • A. Jadbabaie, J. Lin, and A. S. Morse. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Transactions on Automatic Control, 48(6):988-1001, 2003.
    • (2003) IEEE Transactions on Automatic Control , vol.48 , Issue.6 , pp. 988-1001
    • Jadbabaie, A.1    Lin, J.2    Morse, A.S.3
  • 19
    • 79956010218 scopus 로고    scopus 로고
    • A trust based distributed Kalman filtering approach for mode estimation in power systems
    • Stockholm, Sweden, April
    • T. Jiang, I. Matei, and J. S. Baras. A trust based distributed Kalman filtering approach for mode estimation in power systems. In Proceedings of The First Workshop on Secure Control Systems, Stockholm, Sweden, April 2010.
    • (2010) Proceedings of the First Workshop on Secure Control Systems
    • Jiang, T.1    Matei, I.2    Baras, J.S.3
  • 20
    • 16244397028 scopus 로고    scopus 로고
    • Stabilization of nonlinear systems with limited information feedback
    • D. Liberzon and J. P. Hespanha. Stabilization of nonlinear systems with limited information feedback. IEEE Transactions on Automatic Control, 50(6):910-915, 2005.
    • (2005) IEEE Transactions on Automatic Control , vol.50 , Issue.6 , pp. 910-915
    • Liberzon, D.1    Hespanha, J.P.2
  • 21
    • 79953146655 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in wireless sensor networks
    • Atlanta, USA, December
    • Y. Mo, E. Garone, A. Casavola, and B. Sinopoli. False data injection attacks against state estimation in wireless sensor networks. In IEEE Conf. on Decision and Control, pages 5967-5972, Atlanta, USA, December 2010.
    • (2010) IEEE Conf. on Decision and Control , pp. 5967-5972
    • Mo, Y.1    Garone, E.2    Casavola, A.3    Sinopoli, B.4
  • 22
  • 25
    • 7244224694 scopus 로고    scopus 로고
    • Input-output stability properties of networked control systems
    • D. Nesic and A. Teel. Input-output stability properties of networked control systems. IEEE Transactions on Automatic Control, 49(10):1650-1667, 2004.
    • (2004) IEEE Transactions on Automatic Control , vol.49 , Issue.10 , pp. 1650-1667
    • Nesic, D.1    Teel, A.2
  • 26
    • 4644244041 scopus 로고    scopus 로고
    • Consensus problems in networks of agents with switching topology and time-delays
    • R. Olfati-Saber and R. M. Murray. Consensus problems in networks of agents with switching topology and time-delays. IEEE Transactions on Automatic Control, 49(9):1520-1533, 2004.
    • (2004) IEEE Transactions on Automatic Control , vol.49 , Issue.9 , pp. 1520-1533
    • Olfati-Saber, R.1    Murray, R.M.2
  • 27
    • 80051925336 scopus 로고    scopus 로고
    • Consensus computation in unreliable networks: A system theoretic approach
    • February To appear
    • F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable networks: A system theoretic approach. IEEE Transactions on Automatic Control, February 2010. To appear.
    • (2010) IEEE Transactions on Automatic Control
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 28
    • 84859752461 scopus 로고    scopus 로고
    • Distributed estimation and false data detection with application to power networks
    • submitted
    • F. Pasqualetti, R. Carli, and F. Bullo. Distributed estimation and false data detection with application to power networks. Automatica. submitted.
    • Automatica
    • Pasqualetti, F.1    Carli, R.2    Bullo, F.3
  • 32
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • To appear
    • S. Sundaram and C. N. Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control. To appear.
    • IEEE Transactions on Automatic Control
    • Sundaram, S.1    Hadjicostis, C.N.2
  • 38
    • 80053166327 scopus 로고    scopus 로고
    • Stackelberg game analysis of correlated attacks in cyber-physical systems
    • To appear
    • M. Zhu and S. Martínez. Stackelberg game analysis of correlated attacks in cyber-physical systems. In 2011 American Control Conference, 2011. To appear.
    • (2011) 2011 American Control Conference
    • Zhu, M.1    Martínez, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.