Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel
暂无分享,去创建一个
[1] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[2] Panos J. Antsaklis,et al. Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.
[3] Chao Yang,et al. Jamming attack in centralized state estimation , 2015, 2015 34th Chinese Control Conference (CCC).
[4] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[5] Insup Lee,et al. Cyber-physical systems: The next computing revolution , 2010, Design Automation Conference.
[6] Yu Cheng,et al. Optimal Jamming Attack Schedule Against Wireless State Estimation in Cyber-Physical Systems , 2016, WASA.
[7] Xiaoqiang Ren,et al. Infinite Horizon Optimal Transmission Power Control for Remote State Estimation Over Fading Channels , 2016, IEEE Transactions on Automatic Control.
[8] Oscar Vega-Amaya,et al. The average cost optimality equation: A fixed point approach , 2003 .
[9] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[10] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[11] P. Spreij. Probability and Measure , 1996 .
[12] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[13] Robert J. Elliott,et al. On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[14] David P. Fidler. Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.
[15] Pietro Tesi,et al. Networked Control of Nonlinear Systems under Denial-of-Service , 2016 .
[16] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[17] Ling Shi,et al. Sensor data scheduling for linear quadratic Gaussian control with full state feedback , 2012, 2012 American Control Conference (ACC).
[18] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[19] Yang Han,et al. Adaptive two-way relaying and outage analysis , 2009, IEEE Transactions on Wireless Communications.
[20] Karl Henrik Johansson,et al. A secure control framework for resource-limited adversaries , 2012, Autom..
[21] W. Fleming. Book Review: Discrete-time Markov control processes: Basic optimality criteria , 1997 .
[22] Ling Shi,et al. A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..
[23] Daniel E. Quevedo,et al. On Kalman filtering over fading wireless channels with controlled transmission powers , 2012, Autom..
[24] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[25] Alejandro Ribeiro,et al. Optimal Power Management in Wireless Control Systems , 2014, IEEE Transactions on Automatic Control.
[26] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[27] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[28] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.