-
1
-
-
70049103826
-
Optimal stabilizing gain selection for networked control systems with time delays and packet losses
-
Sep.
-
H. Li, M. Y. Chow, and Z. Sun, "Optimal stabilizing gain selection for networked control systems with time delays and packet losses," IEEE Trans. Control Syst. Technol., vol. 17, no. 5, pp. 1154-1162, Sep. 2009.
-
(2009)
IEEE Trans. Control Syst. Technol.
, vol.17
, Issue.5
, pp. 1154-1162
-
-
Li, H.1
Chow, M.Y.2
Sun, Z.3
-
2
-
-
84910032560
-
Robust path diversity for network quality of service in cyber-physical systems
-
Nov.
-
K. J. Park, J. Kim, H. Lim, and Y. Eun, "Robust path diversity for network quality of service in cyber-physical systems," IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2204-2215, Nov. 2014.
-
(2014)
IEEE Trans. Ind. Informat.
, vol.10
, Issue.4
, pp. 2204-2215
-
-
Park, K.J.1
Kim, J.2
Lim, H.3
Eun, Y.4
-
3
-
-
84921502597
-
Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems
-
Feb.
-
F. Pasqualetti and F. Dorfler, "Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems," IEEE Control Syst. Mag., vol. 35, no. 1, pp. 110-127, Feb. 2015.
-
(2015)
IEEE Control Syst. Mag.
, vol.35
, Issue.1
, pp. 110-127
-
-
Pasqualetti, F.1
Dorfler, F.2
-
4
-
-
84921500356
-
Covert misappropriation of networked control systems: Presenting a feedback structure
-
Feb.
-
R. S. Smith, "Covert misappropriation of networked control systems: Presenting a feedback structure," IEEE Control Syst. Mag., vol. 35, no. 1, pp. 82-92, Feb. 2015.
-
(2015)
IEEE Control Syst. Mag.
, vol.35
, Issue.1
, pp. 82-92
-
-
Smith, R.S.1
-
5
-
-
84919930769
-
Security games for risk minimization in automatic generation control
-
Jan.
-
Y. W. Law, T. Alpcan, and M. Palaniswami, "Security games for risk minimization in automatic generation control," IEEE Trans. Power Syst., vol. 30, no. 1, pp. 223-232, Jan. 2015.
-
(2015)
IEEE Trans. Power Syst.
, vol.30
, Issue.1
, pp. 223-232
-
-
Law, Y.W.1
Alpcan, T.2
Palaniswami, M.3
-
6
-
-
84920703223
-
A secure control framework for resource-limited adversaries
-
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, "A secure control framework for resource-limited adversaries," Automatica, vol. 51, pp. 135-148, 2015.
-
(2015)
Automatica
, vol.51
, pp. 135-148
-
-
Teixeira, A.1
Shames, I.2
Sandberg, H.3
Johansson, K.H.4
-
7
-
-
84922357776
-
Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach
-
Y. Yuan, F. Sun, and H. Liu, "Resilient control of cyber-physical systems against intelligent attacker: A hierarchal stackelberg game approach," Int. J. Syst. Sci., vol. 47, no. 9, pp. 2067-2077, 2015.
-
(2015)
Int. J. Syst. Sci.
, vol.47
, Issue.9
, pp. 2067-2077
-
-
Yuan, Y.1
Sun, F.2
Liu, H.3
-
8
-
-
20344364652
-
Denial-of-Service attacks on network-based control systems: Impact and mitigation
-
May
-
M. Long, C. H. J. Wu, and J. Y. Hung, "Denial-of-Service attacks on network-based control systems: Impact and mitigation," IEEE Trans. Ind. Informat., vol. 1, no. 2, pp. 85-96, May 2005.
-
(2005)
IEEE Trans. Ind. Informat.
, vol.1
, Issue.2
, pp. 85-96
-
-
Long, M.1
Wu, C.H.J.2
Hung, J.Y.3
-
9
-
-
84896803839
-
Consesus of discrete-time multiagent with adversaries and time delays
-
Y. Wu, X. He, S. Liu, and L. Xie, "Consesus of discrete-time multiagent with adversaries and time delays," Int. J. Gen. Syst., vol. 43, no. 3, pp. 402-411, 2014.
-
(2014)
Int. J. Gen. Syst.
, vol.43
, Issue.3
, pp. 402-411
-
-
Wu, Y.1
He, X.2
Liu, S.3
Xie, L.4
-
10
-
-
84921497384
-
Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems
-
Feb.
-
Q. Zhu and T. Basar, "Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems," IEEE Control Syst. Mag., vol. 35, no. 1, pp. 46-65, Feb. 2015.
-
(2015)
IEEE Control Syst. Mag.
, vol.35
, Issue.1
, pp. 46-65
-
-
Zhu, Q.1
Basar, T.2
-
11
-
-
84945315428
-
Optimal denial-of-service attack scheduling with energy constraint
-
Nov.
-
H. Zhang, P. Cheng. L. Shi, J. M. Chen, "Optimal denial-of-service attack scheduling with energy constraint," IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023-3028, Nov. 2015.
-
(2015)
IEEE Trans. Autom. Control
, vol.60
, Issue.11
, pp. 3023-3028
-
-
Zhang, H.1
Cheng, P.2
Shi, L.3
Chen, J.M.4
-
12
-
-
84897727324
-
On the performance analysis of resilient networked control systems under replay attacks
-
Mar.
-
M. Zhu and S. Martinez, "On the performance analysis of resilient networked control systems under replay attacks," IEEE Trans. Autom. Control, vol. 59, no. 3, pp. 804-808, Mar. 2014.
-
(2014)
IEEE Trans. Autom. Control
, vol.59
, Issue.3
, pp. 804-808
-
-
Zhu, M.1
Martinez, S.2
-
13
-
-
84874238591
-
Resilient event triggered systems with limited communication
-
L. Li, B. Hu, and M. D. Lemmon, "Resilient event triggered systems with limited communication," in Proc. IEEE Conf. Decis. Control, 2012, pp. 6577-6582.
-
(2012)
Proc. IEEE Conf. Decis. Control
, pp. 6577-6582
-
-
Li, L.1
Hu, B.2
Lemmon, M.D.3
-
15
-
-
84930091988
-
Data fusion-based resilient control system under DoS attacks: A game theoretic approach
-
Y. Yuan and F. Sun, "Data fusion-based resilient control system under DoS attacks: A game theoretic approach," Int. J. Control Autom. Syst., vol. 13, no. 3, pp. 513-520, 2015.
-
(2015)
Int. J. Control Autom. Syst.
, vol.13
, Issue.3
, pp. 513-520
-
-
Yuan, Y.1
Sun, F.2
-
16
-
-
84893916341
-
Jamming attack on cyber-physical systems: A game-theoretic approach
-
Y. Li, L. Shi, P. Cheng, J. Chen, and D. E. Quevedo, "Jamming attack on cyber-physical systems: A game-theoretic approach," in Proc. Annu. Int. Conf. Cyber Technol. Autom. Control Intell. Syst., 2013, pp. 252-257.
-
(2013)
Proc. Annu. Int. Conf. Cyber Technol. Autom. Control Intell. Syst.
, pp. 252-257
-
-
Li, Y.1
Shi, L.2
Cheng, P.3
Chen, J.4
Quevedo, D.E.5
-
17
-
-
84871258626
-
Security of interdependent and identical networked control systems
-
S. Amin, S. A. Galina, and S. S. Galina, "Security of interdependent and identical networked control systems," Automatica, vol. 49, no. 1, pp. 186-192, 2013.
-
(2013)
Automatica
, vol.49
, Issue.1
, pp. 186-192
-
-
Amin, S.1
Galina, S.A.2
Galina, S.S.3
-
18
-
-
84864458629
-
Low frequency positive real control for delta operator systems
-
H. Yang and Y. Xia, "Low frequency positive real control for delta operator systems," Automatica, vol. 48, no. 8, pp. 1791-1795, 2012.
-
(2012)
Automatica
, vol.48
, Issue.8
, pp. 1791-1795
-
-
Yang, H.1
Xia, Y.2
-
19
-
-
69349104256
-
Robust sliding-mode control for uncertain time-delay systems based on delta operator
-
Sep.
-
Y. Xia, M. Fu, H. Yang, and G. P. Liu, "Robust sliding-mode control for uncertain time-delay systems based on delta operator," IEEE Trans. Ind. Electron., vol. 56, no. 9, pp. 3646-3655, Sep. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.9
, pp. 3646-3655
-
-
Xia, Y.1
Fu, M.2
Yang, H.3
Liu, G.P.4
-
20
-
-
85027957809
-
Solutions to the inverse LQR problem with application to biologucal systems analysis
-
Mar.
-
M. C. Priess, R. Conway, J. Choi, J. M. Popovich, and C. Radcliffe, "Solutions to the inverse LQR problem with application to biologucal systems analysis," IEEE Trans. Control Syst. Technol., vol. 23, no. 2, pp. 770-777, Mar. 2015.
-
(2015)
IEEE Trans. Control Syst. Technol.
, vol.23
, Issue.2
, pp. 770-777
-
-
Priess, M.C.1
Conway, R.2
Choi, J.3
Popovich, J.M.4
Radcliffe, C.5
-
21
-
-
84883498927
-
Energy management via pricing in LQ dynamic games
-
S. Coogan, L. Ratliff, D. Calderone, C. Tomlin, and S. Sastry, "Energy management via pricing in LQ dynamic games," in Proc. Amer. Control Conf., 2013, pp. 443-448.
-
(2013)
Proc. Amer. Control Conf.
, pp. 443-448
-
-
Coogan, S.1
Ratliff, L.2
Calderone, D.3
Tomlin, C.4
Sastry, S.5
-
23
-
-
0036779278
-
A J-lossless coprime factorisation approach to H8 control in delta domain
-
P. Suchomski, "A J-lossless coprime factorisation approach to H8 control in delta domain," Automatica, vol. 38, no. 10, pp. 1807-1814, 2002.
-
(2002)
Automatica
, vol.38
, Issue.10
, pp. 1807-1814
-
-
Suchomski, P.1
-
24
-
-
84856477768
-
LQG control for MIMO systems over multiple erasure channels with perfect acknowledgment
-
Feb.
-
E. Garone, B. Sinopoli, A. Goldsmith, and A. Casavola, "LQG control for MIMO systems over multiple erasure channels with perfect acknowledgment," IEEE Trans. Autom. Control, vol. 57, no. 2, pp. 450-456, Feb. 2012.
-
(2012)
IEEE Trans. Autom. Control
, vol.57
, Issue.2
, pp. 450-456
-
-
Garone, E.1
Sinopoli, B.2
Goldsmith, A.3
Casavola, A.4
|