Communication Link Elimination in Static LQG Teams
暂无分享,去创建一个
[1] Ronald L. Smith. Some interlacing properties of the Schur complement of a Hermitian matrix , 1992 .
[2] Bruno Sinopoli,et al. Sensor selection strategies for state estimation in energy constrained wireless sensor networks , 2011, Autom..
[3] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[4] Thomas Engel,et al. A Car Hacking Experiment: When Connectivity Meets Vulnerability , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[5] Tamer Basar,et al. One-stage control over an adversarial channel with finite codelength , 2011, IEEE Conference on Decision and Control and European Control Conference.
[6] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[7] Christoph Schmittner,et al. Standardization challenges for safety and security of connected, automated and intelligent vehicles , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).
[8] Guosong Yang,et al. Modeling and Mitigating the Coremelt Attack , 2018, 2018 Annual American Control Conference (ACC).
[9] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2011 .
[10] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[11] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[12] Paulo Tabuada,et al. Robustness of attack-resilient state estimators , 2014, 2014 ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS).
[13] Andrew K. Wright,et al. Low-Latency Cryptographic Protection for SCADA Communications , 2004, ACNS.
[14] R. Radner,et al. Team Decision Problems , 1962 .
[15] Lei Fan,et al. Classified security protection evaluation for vehicle information system , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).
[16] Y. Ho,et al. Team decision theory and information structures in optimal control problems--Part II , 1972 .
[17] Daniel E. Quevedo,et al. Encrypted Cooperative Control Based on Structured Feedback , 2019, IEEE Control Systems Letters.
[18] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[19] Hiro Onishi,et al. Approaches for vehicle cyber security , 2014, 2014 IEEE Conference on Communications and Network Security.
[20] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[21] Alan J. Laub,et al. Matrix analysis - for scientists and engineers , 2004 .
[22] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[23] Tamer Basar,et al. A dynamic transmitter-jammer game with asymmetric information , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[24] Paulo Tabuada,et al. Secure state-estimation for dynamical systems under active adversaries , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).