On Single-Input Controllable Linear Systems Under Periodic DoS Jamming Attacks
暂无分享,去创建一个
[1] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[2] Paulo Tabuada,et al. Event-Triggered Real-Time Scheduling of Stabilizing Control Tasks , 2007, IEEE Transactions on Automatic Control.
[3] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[4] V. Faddeeva,et al. Computational methods of linear algebra: : chapter 1, basic material from linear algebra , 1952 .
[5] Ruggero Carli,et al. Distributed Estimation and False Data Detection with Application to Power Networks , 2011, ArXiv.
[6] Manuel Mazo,et al. An ISS self-triggered implementation of linear controllers , 2009, Autom..
[7] C.N. Hadjicostis,et al. Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.
[8] Sonia Martínez,et al. Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.
[9] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[10] Paulo Tabuada,et al. Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] John S. Baras,et al. Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.
[12] D. Bernstein. Matrix Mathematics: Theory, Facts, and Formulas , 2009 .
[13] Alexandros G. Fragkiadakis,et al. Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.
[14] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[15] D. Faddeev,et al. Computational methods of linear algebra , 1981 .
[16] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[17] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[18] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[19] S. Basu,et al. Algorithms in Real Algebraic Geometry (Algorithms and Computation in Mathematics) , 2006 .
[20] Sourabh Bhattacharya,et al. Differential Game-Theoretic Approach to a Spatial Jamming Problem , 2013 .
[21] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[22] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[23] Xiapu Luo,et al. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals , 2009, EURASIP J. Adv. Signal Process..
[24] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[25] Xiapu Luo,et al. On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.
[26] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).
[27] C. Loan. The Sensitivity of the Matrix Exponential , 1977 .
[28] Sonia Martínez,et al. On distributed constrained formation control in operator-vehicle adversarial networks , 2013, Autom..
[29] Patrick Tague,et al. Digital Filter Design for Jamming Mitigation in 802.15.4 Communication , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[30] Aloysius K. Mok. Position Paper for Workshop on Future Directions in Cyber-physical Systems Security , 2009 .
[31] Xiaofeng Wang,et al. Self-Triggered Feedback Control Systems With Finite-Gain ${\cal L}_{2}$ Stability , 2009, IEEE Transactions on Automatic Control.