-
2
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Lecture notes in computer science series
-
S. Amin, A. Cardenas, and S. Sastry Safe and secure networked control systems under denial-of-service attacks Hybrid systems: computation and control Lecture notes in computer science series Vol. 5469 2009 31 45
-
(2009)
Hybrid Systems: Computation and Control
, vol.5469
, pp. 31-45
-
-
Amin, S.1
Cardenas, A.2
Sastry, S.3
-
3
-
-
0003677229
-
-
Graduate texts in mathematics Springer-Verlag New York
-
R. Diestel Graph theory Graduate texts in mathematics Vol. 173 2000 Springer-Verlag New York
-
(2000)
Graph Theory
, vol.173
-
-
Diestel, R.1
-
7
-
-
84930251952
-
Controllability analysis of multi-agent systems using relaxed equitable partitions
-
S. Martini, M. Egerstedt, and A. Bicchi Controllability analysis of multi-agent systems using relaxed equitable partitions International Journal of Systems, Control and Communications 2 1-3 2010 100 121
-
(2010)
International Journal of Systems, Control and Communications
, vol.2
, Issue.13
, pp. 100-121
-
-
Martini, S.1
Egerstedt, M.2
Bicchi, A.3
-
8
-
-
77949601382
-
Secure control against replay attacks
-
Urbana, IL, September 30-October 2
-
Mo, Y.; Sinopoli, B. (2009). Secure control against replay attacks. In Proceedings of the 2009 Allerton conference on communication, control, and computing. Urbana, IL, September 30-October 2.
-
(2009)
Proceedings of the 2009 Allerton Conference on Communication, Control, and Computing
-
-
Mo, Y.1
Sinopoli, B.2
-
10
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Orlando, FL, USA, December
-
Pasqualetti, F.; Dorfler, F.; Bullo, F. (2011). Cyber-physical attacks in power networks: models, fundamental limitations and monitor design. In IEEE conf. on decision and control and European control conference (pp. 2195-2201). Orlando, FL, USA, December.
-
(2011)
IEEE Conf. on Decision and Control and European Control Conference
, pp. 2195-2201
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
12
-
-
20344399896
-
Consensus seeking in multiagent systems under dynamically changing interaction topologies
-
W. Ren, and R.W. Beard Consensus seeking in multiagent systems under dynamically changing interaction topologies IEEE Transactions on Automatic Control 50 5 2005 655 661
-
(2005)
IEEE Transactions on Automatic Control
, vol.50
, Issue.5
, pp. 655-661
-
-
Ren, W.1
Beard, R.W.2
-
13
-
-
84883556868
-
State detection from local measurements in network synchronization processes
-
S. Roy, and C.-W. Chen State detection from local measurements in network synchronization processes International Journal of Control 86 9 2013
-
(2013)
International Journal of Control
, vol.86
, Issue.9
-
-
Roy, S.1
Chen, C.-W.2
-
14
-
-
33645408366
-
Formation and alignment of distributed sensing agents with double-integrator dynamics and actuator saturation
-
S. Phoha
-
S. Roy, A. Saberi, and K. Herlugson Formation and alignment of distributed sensing agents with double-integrator dynamics and actuator saturation S. Phoha, Sensor network operations 2004
-
(2004)
Sensor Network Operations
-
-
Roy, S.1
Saberi, A.2
Herlugson, K.3
-
15
-
-
84864620360
-
Security and discovery of spread dynamics in cyber-physical networks
-
[special issue on Cyber Physical Systems]
-
S. Roy, M. Xue, and S.K. Das Security and discovery of spread dynamics in cyber-physical networks IEEE Transactions on Parallel and Distributed Systems 23 9 2012 1694 1707 [special issue on Cyber Physical Systems]
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.9
, pp. 1694-1707
-
-
Roy, S.1
Xue, M.2
Das, S.K.3
-
16
-
-
77957776818
-
Distributed fault detection for interconnected second-order systems with application to power networks
-
Stockholm, Sweden, April
-
Shames, I.; Texiera, A. H.; Sandberg, H.; Johansson, K. H. (2010). Distributed fault detection for interconnected second-order systems with application to power networks. In First workshop on secure control systems. Stockholm, Sweden, April.
-
(2010)
First Workshop on Secure Control Systems
-
-
Shames, I.1
Texiera A., .H.2
Sandberg, H.3
Johansson K., .H.4
-
18
-
-
84874280686
-
Detection and identification of cyber-attacks in power-system state estimation
-
Montreal, Canada, June
-
Sou, K. C.; Sandberg, H.; Johansson, K. H. (2012). Detection and identification of cyber-attacks in power-system state estimation. In Proceedings of the 2012 American control conference. Montreal, Canada, June.
-
(2012)
Proceedings of the 2012 American Control Conference
-
-
Sou K., .C.1
Sandberg, H.2
Johansson K., .H.3
-
20
-
-
79960124958
-
Distributed function calculation via linear iterative strategies in the presence of malicious agents
-
S. Sundaram, and C.N. Hadjicostis Distributed function calculation via linear iterative strategies in the presence of malicious agents IEEE Transactions on Automatic Control 56 7 2011 1495 1508
-
(2011)
IEEE Transactions on Automatic Control
, vol.56
, Issue.7
, pp. 1495-1508
-
-
Sundaram, S.1
Hadjicostis, C.N.2
-
21
-
-
84902324955
-
Fast distributed estimation of probability mass functions over anonymous networks
-
Florence, Italy, December
-
Telerius, H.; Varagnolo, D.; Baquero, C.; Johansson, K. H. (2013). Fast distributed estimation of probability mass functions over anonymous networks. In Proceedings of IEEE 52nd conference on decision and control. Florence, Italy, December.
-
(2013)
Proceedings of IEEE 52nd Conference on Decision and Control
-
-
Telerius, H.1
Varagnolo, D.2
Baquero, C.3
Johansson K., .H.4
-
22
-
-
77957775842
-
Networked control systems under cyber attacks with applications to power networks
-
Baltimore, MD, June 30-July 2
-
Texiera, A.; Sandberg, H.; Johansson, K. H. (2010). Networked control systems under cyber attacks with applications to power networks. In Proceedings of the 2010 American control conference. Baltimore, MD, June 30-July 2.
-
(2010)
Proceedings of the 2010 American Control Conference
-
-
Texiera, A.1
Sandberg, H.2
Johansson K., .H.3
-
24
-
-
84896757489
-
Security and vulnerability of cyber-physical infrastructure networks: A control-theoretic perspective
-
S.K. Das, K. Kant, N. Zhang, (Chapter 1)
-
M. Xue, S. Roy, Y. Wan, and S.K. Das Security and vulnerability of cyber-physical infrastructure networks: a control-theoretic perspective S.K. Das, K. Kant, N. Zhang, Handbook on securing cyber-physical critical infrastructure 2011 (Chapter 1)
-
(2011)
Handbook on Securing Cyber-physical Critical Infrastructure
-
-
Xue, M.1
Roy, S.2
Wan, Y.3
Das, S.K.4
-
25
-
-
80053166327
-
Stackelberg-game analysis of correlated attacks in cyber-physical systems
-
San Francisco, CA, June
-
Zhu, M.; Martinez, S. (2011). Stackelberg-game analysis of correlated attacks in cyber-physical systems. In Proceedings of the 2011 American control conference. San Francisco, CA, June.
-
(2011)
Proceedings of the 2011 American Control Conference
-
-
Zhu, M.1
Martinez, S.2
|