Model-based resilient control for a multi-agent system against Denial of Service attacks
暂无分享,去创建一个
[1] S. Shankar Sastry,et al. Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..
[2] Xavier Litrico,et al. Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.
[3] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[4] Lee H. Keel,et al. Secured formation control for multi-agent systems under DoS attacks , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).
[5] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[6] Kar-Han Tan,et al. High Precision Formation Control of Mobile Robots Using Virtual Structures , 1997, Auton. Robots.
[7] Tucker R. Balch,et al. Behavior-based formation control for multirobot teams , 1998, IEEE Trans. Robotics Autom..
[8] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[9] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[10] Sherali Zeadally,et al. Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..
[11] Vijay Kumar,et al. Leader-to-formation stability , 2004, IEEE Transactions on Robotics and Automation.
[12] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[13] David Geer. Security of critical control systems sparks concern , 2006, Computer.
[14] Mireille E. Broucke,et al. Local control strategies for groups of mobile autonomous agents , 2004, IEEE Transactions on Automatic Control.
[15] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[16] Sonia Martínez,et al. Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.
[17] Alfred M. Bruckstein,et al. Ants, Crickets and Frogs in Cyclic Pursuit , 1991 .
[18] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[19] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[20] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[21] Mo-Yuen Chow,et al. Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems , 2014, IEEE Transactions on Cybernetics.
[22] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[23] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[24] Tansel Yucelen,et al. Resilient networked multiagent systems: A distributed adaptive control approachy , 2014, 53rd IEEE Conference on Decision and Control.