Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control
暂无分享,去创建一个
Ling Shi | Jiming Chen | Peng Cheng | Heng Zhang | Ling Shi | Jiming Chen | Heng Zhang | Peng Cheng
[1] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[2] R. Srikant,et al. Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[3] Bruno Sinopoli,et al. Networked Sensing, Estimation and Control Systems , 2009 .
[4] Sonia Martínez,et al. On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[5] Michael Zuba,et al. Launching denial-of-service jamming attacks in underwater sensor networks , 2011, WUWNet '11.
[6] Lihua Xie,et al. Optimal controller location in wireless networked control systems , 2015 .
[7] Jiming Chen,et al. Distributed Collaborative Control for Industrial Automation With Wireless Sensor and Actuator Networks , 2010, IEEE Transactions on Industrial Electronics.
[8] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[9] João Pedro Hespanha,et al. A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.
[10] Leiba Rodman,et al. Algebraic Riccati equations , 1995 .
[11] Yan Zhang,et al. Development of an integrated wireless sensor network micro-environmental monitoring system. , 2008, ISA transactions.
[12] Ling Shi,et al. Online Deception Attack against Remote State Estimation , 2014 .
[13] Mo-Yuen Chow,et al. Networked Control System: Overview and Research Trends , 2010, IEEE Transactions on Industrial Electronics.
[14] R. Srikant,et al. Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.
[15] Richard A. Poisel,et al. Modern Communications Jamming Principles and Techniques , 2003 .
[16] Richard M. Murray,et al. Optimal LQG control across packet-dropping links , 2007, Syst. Control. Lett..
[17] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[18] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[19] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[20] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[21] Ling Shi,et al. Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.
[22] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[23] Ling Shi,et al. SATS: Secure Average-Consensus-Based Time Synchronization in Wireless Sensor Networks , 2013, IEEE Transactions on Signal Processing.
[24] Ling Shi,et al. Sensor data scheduling for linear quadratic Gaussian control with full state feedback , 2012, 2012 American Control Conference (ACC).
[25] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[26] S. Sastry,et al. Optimal control with unreliable communication: the TCP case , 2005, Proceedings of the 2005, American Control Conference, 2005..
[27] Eitan Altman,et al. A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.