-
1
-
-
84884082267
-
Security and vulnerability of cyber-physical infrastructure networks: A control-Theoretic approach
-
S. Das, K. Kant, and N. Zhang, eds. Morgan-Kauffman
-
M. Xue, S. Roy, Y. Wan, and S. K. Das, "Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach," Security Cyber-Physical Infrastructures: Foundations and Challenges, S. Das, K. Kant, and N. Zhang, eds. Morgan-Kauffman, 2012.
-
(2012)
Security Cyber-Physical Infrastructures: Foundations and Challenges
-
-
Xue, M.1
Roy, S.2
Wan, Y.3
Das, S.K.4
-
2
-
-
77950792899
-
On inference of network time constants from impulse response data: Graph-Theoretic cramer-rao bounds
-
Dec.
-
Y. Wan and S. Roy, "On Inference of Network Time Constants from Impulse Response Data: Graph-Theoretic Cramer-Rao Bounds," Proc. Conf. Decision and Control, pp. 4111-4116, Dec. 2009.
-
(2009)
Proc. Conf. Decision and Control
, pp. 4111-4116
-
-
Wan, Y.1
Roy, S.2
-
3
-
-
85086490807
-
Initial-condition estimation in network synchronization processes: Graphical characterizations of estimator structure and performance
-
Aug.
-
M. Xue, E. Yeung, A. Rai, S. Roy, Y. Wan, and S. Warnick, "Initial-Condition Estimation in Network Synchronization Processes: Graphical Characterizations of Estimator Structure and Performance," Proc. AIAA Guidance, Navigation and Control Conf., Aug. 2011.
-
(2011)
Proc. AIAA Guidance, Navigation and Control Conf.
-
-
Xue, M.1
Yeung, E.2
Rai, A.3
Roy, S.4
Wan, Y.5
Warnick, S.6
-
4
-
-
80053139315
-
Spectral and graph-Theoretic bounds on steady-state-probability estimation performance for an ergodic markov chain
-
July, doi:10.1016/j.jfranklin.2011.07.010
-
M. Xue and S. Roy, "Spectral and Graph-Theoretic Bounds on Steady-State-Probability Estimation Performance for an Ergodic Markov Chain," Proc. Am. Control Conf., July 2011, doi:10.1016/j.jfranklin.2011. 07.010.
-
(2011)
Proc. Am. Control Conf.
-
-
Xue, M.1
Roy, S.2
-
5
-
-
58849089560
-
An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks
-
Mar.
-
P. De, Y. Liu, and S. K. Das, "An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 413-425, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.3
, pp. 413-425
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
6
-
-
67651048997
-
Deployment aware modeling of node compromise spread in wireless sensor networks
-
May
-
P. De, Y. Liu, and S. K. Das, "Deployment Aware Modeling of Node Compromise Spread in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 5, no. 3, pp. 413-425, May 2009.
-
(2009)
ACM Trans. Sensor Networks
, vol.5
, Issue.3
, pp. 413-425
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
7
-
-
0001290965
-
Minimum variance quadratic unbiased estimation of variance components
-
C. R. Rao, "Minimum Variance Quadratic Unbiased Estimation of Variance Components," J. Multivariate Analysis, vol. 1, no. 4, pp. 445-456, 1971.
-
(1971)
J. Multivariate Analysis
, vol.1
, Issue.4
, pp. 445-456
-
-
Rao, C.R.1
-
9
-
-
42949124378
-
A new focus in the science of networks: Toward methods for design
-
Mar.
-
Y. Wan, S. Roy, and A. Saberi, "A New Focus in the Science of Networks: Toward Methods for Design," Proc. Royal Soc. A, vol. 464, pp. 513-555, Mar. 2008.
-
(2008)
Proc. Royal Soc. A
, vol.464
, pp. 513-555
-
-
Wan, Y.1
Roy, S.2
Saberi, A.3
-
10
-
-
84866371780
-
Designing linear distributed algorithms with memory for fast convergence
-
doi: 10. 1002/rnc. 1778
-
S. Roy, Y. Wan, A. Saberi, and M. Xue, "Designing Linear Distributed Algorithms with Memory for Fast Convergence," Int'l J. Robust and Nonlinear Control, 2011, doi: 10. 1002/rnc. 1778.
-
(2011)
Int'l J. Robust and Nonlinear Control
-
-
Roy, S.1
Wan, Y.2
Saberi, A.3
Xue, M.4
-
11
-
-
80055085529
-
A network control theory approach to modeling and optimal control of zoonoses: A case study of brucellosis transmission in sub-saharan africa
-
S. Roy, T. McElwain, and Y. Wan, "A Network Control Theory Approach to Modeling and Optimal Control of Zoonoses: A Case Study of Brucellosis Transmission in Sub-Saharan Africa," PLOS Neglected Tropical Diseases, vol. 10, p. e1259, 2010.
-
(2010)
PLOS Neglected Tropical Diseases
, vol.10
-
-
Roy, S.1
McElwain, T.2
Wan, Y.3
-
12
-
-
33746345579
-
A control-theoretic approach to distributed discrete-valued decision-making in networks of sensing agents
-
DOI 10.1109/TMC.2006.106, 1644742
-
S. Roy, K. Herlugson, and A. Saberi, "A Control-Theoretic Approach to Distributed Discrete-Valued Decision-Making in Networks of Sensing Agents," IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 945-957, Aug. 2006. (Pubitemid 44109564)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.8
, pp. 945-957
-
-
Roy, S.1
Herlugson, K.2
Saberi, A.3
-
14
-
-
0029175104
-
Susceptible-infected-removed epidemic models with dynamic partnerships
-
doi: 10. 1007/BF00298647
-
M. Altmann, "Susceptible-Infected-Removed Epidemic Models with Dynamic Partnerships," J. Math. Biology, vol. 33, no. 6, pp. 661-675, 1995, doi: 10. 1007/BF00298647.
-
(1995)
J. Math. Biology
, vol.33
, Issue.6
, pp. 661-675
-
-
Altmann, M.1
-
15
-
-
41349106348
-
The spread of epidemic disease on networks
-
M. E. J. Newman, "The Spread of Epidemic Disease on Networks," Physical Rev. E 66, 016128, 2002.
-
(2002)
Physical Rev. E
, vol.66
, pp. 016128
-
-
Newman, M.E.J.1
-
17
-
-
84864580369
-
Security concepts for the dynamics of communicating autonomous-unmanned- vehicle networks
-
submitted to
-
M. Xue, W. Wang, and S. Roy, "Security Concepts for the Dynamics of Communicating Autonomous-Unmanned-Vehicle Networks," submitted to, Automatica.
-
Automatica
-
-
Xue, M.1
Wang, W.2
Roy, S.3
-
19
-
-
52449133239
-
Majorizations for the dominant eigenvector of a nonnegative matrix
-
June
-
S. Roy, A. Saberi, and Y. Wan, "Majorizations for the Dominant Eigenvector of a Nonnegative Matrix," Proc. Am. Control Conf., pp. 1965-1966, June 2008.
-
(2008)
Proc. Am. Control Conf.
, pp. 1965-1966
-
-
Roy, S.1
Saberi, A.2
Wan, Y.3
-
20
-
-
77956179239
-
Self-disciplinary worms and countermeasures: Modeling and analysis
-
Oct.
-
W. Yu, N. Zhang, X. Fu, and W. Zhao, "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 10, pp. 1501-1514, Oct. 2010.
-
(2010)
IEEE Trans. Parallel and Distributed Systems
, vol.21
, Issue.10
, pp. 1501-1514
-
-
Yu, W.1
Zhang, N.2
Fu, X.3
Zhao, W.4
-
21
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the Spread of Influence through a Social Network," Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 137-146, 2003.
-
(2003)
Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 137-146
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
|