Identifying cyber attacks via local model information
暂无分享,去创建一个
Antonio Bicchi | Ruggero Carli | Francesco Bullo | Fabio Pasqualetti | F. Bullo | A. Bicchi | R. Carli | F. Pasqualetti
[1] Shreyas Sundaram,et al. Distributed function calculation and consensus using linear iterative strategies , 2008, IEEE Journal on Selected Areas in Communications.
[2] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[3] P. Kokotovic,et al. A singular perturbation approach to modeling and control of Markov chains , 1981 .
[4] C.N. Hadjicostis,et al. Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.
[5] F. Bullo,et al. Identifying cyber attacks under local model information , 2010 .
[6] Harry L. Trentelman,et al. Control theory for linear systems , 2002 .
[7] Antonio Bicchi,et al. Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.
[8] Steven X. Ding,et al. Model-based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools , 2008 .