On Attack-Resilient Distributed Formation Control in Operator-Vehicle Networks
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[2] John S. Baras,et al. Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.
[3] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[4] João Pedro Hespanha,et al. Stabilization of nonlinear systems with limited information feedback , 2005, IEEE Transactions on Automatic Control.
[5] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[6] Jie Lin,et al. Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..
[7] Wei Zhang,et al. Stability of networked control systems: explicit analysis of delay , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).
[8] Sonia Martínez,et al. Discrete-time dynamic average consensus , 2010, Autom..
[9] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[10] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[11] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[12] Minghui Zhu,et al. Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.
[13] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[14] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[15] William B. Dunbar,et al. Distributed receding horizon control for multi-vehicle formation stabilization , 2006, Autom..
[16] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).
[17] Ruggero Carli,et al. A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[18] John S. Baras,et al. A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems , 2010 .
[19] P. Olver. Nonlinear Systems , 2013 .
[20] Daniel Liberzon,et al. Quantized feedback stabilization of linear systems , 2000, IEEE Trans. Autom. Control..
[21] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[22] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[23] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[24] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[25] Tansu Alpcan,et al. Network Security , 2010 .
[26] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[27] Brian D. O. Anderson,et al. Reaching a Consensus in a Dynamically Changing Environment: Convergence Rates, Measurement Delays, and Asynchronous Events , 2008, SIAM J. Control. Optim..
[28] Dragan Nesic,et al. Input-output stability properties of networked control systems , 2004, IEEE Transactions on Automatic Control.
[29] Richard M. Murray,et al. Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.
[30] Panos J. Antsaklis,et al. Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.
[31] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[32] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[33] Jorge Cortés,et al. Global and robust formation-shape stabilization of relative sensing networks , 2009, Autom..
[34] Karl Johan Åström,et al. Adaptive Control , 1989, Embedded Digital Control with Microcontrollers.
[35] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[36] Sonia Martínez,et al. Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.