暂无分享,去创建一个
Tianju Sui | Yilin Mo | Dami'an Marelli | Ximing Sun | Minyue Fu | Yilin Mo | M. Fu | D. Marelli | Tianju Sui | Ximing Sun
[1] B. Ripley,et al. Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.
[2] Juan Pablo Conti,et al. The day the samba stopped , 2010 .
[3] Ling Shi,et al. The Performance and Limitations of $\epsilon$- Stealthy Attacks on Higher Order Systems , 2017, IEEE Transactions on Automatic Control.
[4] Christian Commault,et al. Generic properties and control of linear structured systems: a survey , 2003, Autom..
[5] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[6] J. Massey,et al. Invertibility of linear time-invariant dynamical systems , 1969 .
[7] Paulo Tabuada,et al. Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[8] Tansel Yucelen,et al. An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.
[9] Chi-Tsong Chen,et al. Linear System Theory and Design , 1995 .
[10] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[11] Inseok Hwang,et al. A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.
[12] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[13] E. F. Vogel,et al. A plant-wide industrial process control problem , 1993 .
[14] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[15] Brian D. O. Anderson,et al. Output-Nulling Invariant and Controllability Subspaces , 1975 .
[16] Xu Jin,et al. An adaptive control architecture for leader–follower multiagent systems with stochastic disturbances and sensor and actuator attacks , 2019, Int. J. Control.
[17] Mi-Ching Tsai,et al. Robust and Optimal Control , 2014 .
[18] Bevan K. Youse,et al. Introduction to real analysis , 1972 .
[19] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[20] N. Lawrence Ricker,et al. Model predictive control of a continuous, nonlinear, two-phase reactor , 1993 .
[21] Vijay Gupta,et al. Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).
[22] Wassim M. Haddad,et al. An adaptive control architecture for cyber-physical system security in the face of sensor and actuator attacks and exogenous stochastic disturbances , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[23] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[24] Jiming Chen,et al. Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy Attacks , 2017, IEEE Transactions on Industrial Electronics.
[25] A. Willsky,et al. Failure detection and identification , 1989 .
[26] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[27] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[28] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[29] Ling Shi,et al. A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..
[30] Bruno Sinopoli,et al. Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.
[31] Shreyas Sundaram,et al. The wireless control network: Monitoring for malicious behavior , 2010, 49th IEEE Conference on Decision and Control (CDC).
[32] Domenico Prattichizzo,et al. Geometric Control Theory for Linear Systems: a Tutorial , 2010 .
[33] Wassim M. Haddad,et al. An Adaptive Control Architecture for Leader-Follower Multiagent Systems with Stochastic Disturbances and Sensor and Actuator Attacks , 2018, 2018 Annual American Control Conference (ACC).
[34] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[35] Alan S. Willsky,et al. A survey of design methods for failure detection in dynamic systems , 1976, Autom..
[36] J. Pearson. Linear multivariable control, a geometric approach , 1977 .