On Multi-Input Controllable Linear Systems Under Unknown Periodic DoS Jamming Attacks
暂无分享,去创建一个
[1] Hamed Shisheh Foroush,et al. On Single-Input Controllable Linear Systems Under Periodic DoS Jamming Attacks , 2012, 1209.4101.
[2] Xiaofeng Wang,et al. Self-Triggered Feedback Control Systems With Finite-Gain ${\cal L}_{2}$ Stability , 2009, IEEE Transactions on Automatic Control.
[3] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[4] Tamer Basar,et al. Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).
[5] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[6] Michael D. Lemmon,et al. Resilient event triggered systems with limited communication , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[7] Sonia Martínez,et al. On distributed constrained formation control in operator-vehicle adversarial networks , 2013, Autom..
[8] Sonia Martínez,et al. On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[9] Paulo Tabuada,et al. Event-Triggered Real-Time Scheduling of Stabilizing Control Tasks , 2007, IEEE Transactions on Automatic Control.
[10] Sourabh Bhattacharya,et al. Differential Game-Theoretic Approach to a Spatial Jamming Problem , 2013 .
[11] John S. Baras,et al. Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.
[12] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[13] Manuel Mazo,et al. An ISS self-triggered implementation of linear controllers , 2009, Autom..
[14] Alexandros G. Fragkiadakis,et al. Anomaly-Based Intrusion Detection Algorithms for Wireless Networks , 2010, WWIC.
[15] Tamer Basar,et al. A dynamic transmitter-jammer game with asymmetric information , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[16] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[17] Sonia Martínez,et al. Attack-resilient distributed formation control via online adaptation , 2011, IEEE Conference on Decision and Control and European Control Conference.
[18] Brian D. O. Anderson,et al. Design of multivariable feedback systems , 1967 .
[19] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[20] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[21] Patrick Tague,et al. Digital Filter Design for Jamming Mitigation in 802.15.4 Communication , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[22] Dennis S. Bernstein,et al. Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear Systems Theory , 2005 .
[23] Ruggero Carli,et al. A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[24] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[25] D. Luenberger. Canonical forms for linear multivariable systems , 1967, IEEE Transactions on Automatic Control.