Event-based predictive security control for periodic denial-of-service jamming attack
暂无分享,去创建一个
Dong Yue | Song Deng | Hui Ge | Xiang-Peng Xie | Song-Lin Hu
[1] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[2] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[3] Dong Yue,et al. Model-Based Event-Triggered Predictive Control for Networked Systems with Data Dropout , 2016, SIAM J. Control. Optim..
[4] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[5] Mauro Conti,et al. Amplified Distributed Denial of Service Attack in Software Defined Networking , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[6] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[7] Yuanqing Xia,et al. Design and Stability Analysis of Networked Predictive Control Systems , 2013, IEEE Transactions on Control Systems Technology.
[8] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[9] P. Kokotovic,et al. Nonlinear control via approximate input-output linearization: the ball and beam example , 1992 .
[10] Dong Yue,et al. Event-triggered controller design of nonlinear discrete-time networked control systems in T-S fuzzy model , 2015, Appl. Soft Comput..
[11] Bruno Sinopoli,et al. Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs , 2015, IEEE Control Systems.
[12] Xiangpeng Xie,et al. Event-Triggered Predictive Control for Networked Nonlinear Systems With Imperfect Premise Matching , 2018, IEEE Transactions on Fuzzy Systems.
[13] Guo-Ping Liu,et al. Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.