On DoS Resiliency Analysis of Networked Control Systems: Trade-Off Between Jamming Actions and Network Delays
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[2] Dragan Nesic,et al. Input-output stability properties of networked control systems , 2004, IEEE Transactions on Automatic Control.
[3] Xiangpeng Xie,et al. Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks , 2019, IEEE Transactions on Cybernetics.
[4] Patrick Tague,et al. Digital Filter Design for Jamming Mitigation in 802.15.4 Communication , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[5] Jos F. Sturm,et al. A Matlab toolbox for optimization over symmetric cones , 1999 .
[6] R. Sanfelice,et al. Hybrid dynamical systems , 2009, IEEE Control Systems.
[7] Ricardo G. Sanfelice,et al. Hybrid Dynamical Systems: Modeling, Stability, and Robustness , 2012 .
[8] Dragan Nesic,et al. A Lyapunov Proof of an Improved Maximum Allowable Transfer Interval for Networked Control Systems , 2007, IEEE Transactions on Automatic Control.
[9] Peter F. Al-Hokayem. Stability Analysis of Networked Control Systems , 2003 .
[10] Pietro Tesi,et al. A Comparison Among Deterministic Packet-Dropouts Models in Networked Control Systems , 2018, IEEE Control Systems Letters.
[11] W. P. M. H. Heemels,et al. Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.
[12] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[13] Xinghuo Yu,et al. Survey on Recent Advances in Networked Control Systems , 2016, IEEE Transactions on Industrial Informatics.
[14] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[15] Luca Zaccarian,et al. Finite-gain LpLp stability for hybrid dynamical systems , 2013, Autom..
[16] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[17] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[18] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[19] Ricardo G. Sanfelice,et al. L2 State Estimation with Guaranteed Convergence Speed in the Presence of Sporadic Measurements , 2018, ArXiv.
[20] E. Yaz. Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.
[21] Huijun Gao,et al. Network-Induced Constraints in Networked Control Systems—A Survey , 2013, IEEE Transactions on Industrial Informatics.
[22] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[23] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[24] Chaohong Cai,et al. Characterizations of input-to-state stability for hybrid systems , 2009, Syst. Control. Lett..
[25] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[26] Johan Löfberg,et al. YALMIP : a toolbox for modeling and optimization in MATLAB , 2004 .
[27] W. P. M. H. Heemels,et al. Output-based event-triggered control systems under Denial-of-Service attacks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[28] Nathan van de Wouw,et al. Networked Control Systems With Communication Constraints: Tradeoffs Between Transmission Intervals, Delays and Performance , 2010, IEEE Transactions on Automatic Control.
[29] Pietro Tesi,et al. Resilient control under Denial-of-Service: Robust design , 2016, ACC.
[30] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.