Mitigation and Resiliency of Multi-Agent Systems Subject to Malicious Cyber Attacks on Communication Links
暂无分享,去创建一个
Nader Meskin | Iman Shames | Mahdi Taheri | Khashayar Khorasani | K. Khorasani | I. Shames | N. Meskin | Mahdi Taheri
[1] Youcheng Lou,et al. Controllability analysis of multi-agent systems with directed and weighted interconnection , 2012, Int. J. Control.
[2] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[3] Khashayar Khorasani,et al. Actuator Fault Detection and Isolation for a Network of Unmanned Vehicles , 2009, IEEE Transactions on Automatic Control.
[4] Zidong Wang,et al. Consensus control for nonlinear multi-agent systems subject to deception attacks , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).
[5] Khashayar Khorasani,et al. Security Index of Linear Cyber-Physical Systems: A Geometric Perspective , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).
[6] Karl Henrik Johansson,et al. Distributed fault detection for interconnected second-order systems , 2011, Autom..
[7] M. Egerstedt,et al. Leader-based multi-agent coordination: controllability and optimal control , 2006, 2006 American Control Conference.
[8] Albert-László Barabási,et al. Control Centrality and Hierarchical Structure in Complex Networks , 2012, PloS one.
[9] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[10] Khashayar Khorasani,et al. Simultaneous fault detection and consensus control design for a network of multi-agent systems , 2016, Autom..
[11] Maryam Zekri,et al. Adaptive fuzzy wavelet network control of second order multi-agent systems with unknown nonlinear dynamics. , 2017, ISA transactions.
[12] Jan C. Willems,et al. Introduction to mathematical systems theory: a behavioral approach, Texts in Applied Mathematics 26 , 1999 .
[13] Tao Li,et al. Consensus of multi-agent systems with general linear dynamics via dynamic output feedback control , 2013 .
[14] Feng Qian,et al. Secure impulsive synchronization control of multi-agent systems under deception attacks , 2018, Inf. Sci..
[15] Alexander Olshevsky,et al. Minimal Controllability Problems , 2013, IEEE Transactions on Control of Network Systems.
[16] Richard M. Murray,et al. Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.
[17] Hamidreza Modares,et al. Attack Analysis for Discrete-time Distributed Multi-Agent Systems , 2019, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Magnus Egerstedt,et al. Controllability of Multi-Agent Systems from a Graph-Theoretic Perspective , 2009, SIAM J. Control. Optim..
[19] M. Kanat Camlibel,et al. Upper and Lower Bounds for Controllable Subspaces of Networks of Diffusively Coupled Agents , 2014, IEEE Transactions on Automatic Control.
[20] Thomas Parisini,et al. Distributed Detection of Covert Attacks for Interconnected Systems , 2019, 2019 18th European Control Conference (ECC).
[21] Khashayar Khorasani,et al. Multi-agent team cooperation: A game theory approach , 2009, Autom..
[22] Aarti Singh,et al. KQML Based Communication Protocol for Multi Agent Systems , 2015 .
[23] Lin Zhang,et al. Controllability of multi‐agent systems under directed topology , 2017 .
[24] John Lygeros,et al. Optimal Sensor and Actuator Placement in Complex Dynamical Networks , 2013, ArXiv.
[25] Ping Zhang,et al. Detection of covert attacks and zero dynamics attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).
[26] Naomi Ehrich Leonard,et al. Optimal leader selection for controllability and robustness in multi-agent networks , 2016, 2016 European Control Conference (ECC).
[27] Lin Huang,et al. Consensus of Multiagent Systems and Synchronization of Complex Networks: A Unified Viewpoint , 2016, IEEE Transactions on Circuits and Systems I: Regular Papers.
[28] Shreyas Sundaram,et al. Spectral properties of the grounded Laplacian matrix with applications to consensus in the presence of stubborn agents , 2014, 2014 American Control Conference.
[29] Yvo Desmedt,et al. Man-in-the-Middle Attack , 2005, Encyclopedia of Cryptography and Security.
[30] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[31] Guoqiang Hu,et al. Distributed consensus tracking for multi‐agent systems under two types of attacks , 2016 .