Related references
Note: Only part of the references are listed.Event-triggered resilient control for cyber-physical system under denial-of-service attacks
Shan Liu et al.
INTERNATIONAL JOURNAL OF CONTROL (2020)
Analysis of Stochastic Switched Systems With Application to Networked Control Under Jamming Attacks
Ahmet Cetinkaya et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)
Security Research on Wireless Networked Control Systems Subject to Jamming Attacks
Hongjiu Yang et al.
IEEE TRANSACTIONS ON CYBERNETICS (2019)
Decentralized Adaptive Fuzzy Secure Control for Nonlinear Uncertain Interconnected Systems Against Intermittent DoS Attacks
Liwei An et al.
IEEE TRANSACTIONS ON CYBERNETICS (2019)
SINR-based multi-channel power schedule under DoS attacks: A Stackelberg game approach with incomplete information
Hao Liu
AUTOMATICA (2019)
State of the art of cyber-physical systems security: An automatic control perspective
Yuriy Zacchia Lun et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2019)
Packet-Based State Feedback Control Under DoS Attacks in Cyber-Physical Systems
Shaoyu Lai et al.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2019)
A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks
Chen Peng et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)
Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service
An-Yang Lu et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2018)
Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks
Jiahu Qin et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2018)
DoS attack in centralised sensor network against state estimation
Chao Yang et al.
IET CONTROL THEORY AND APPLICATIONS (2018)
THE EFFECT OF TIME-VARYING JAMMING INTERFERENCE ON NETWORKED STABILIZATION
Ahmet Cetinkaya et al.
SIAM JOURNAL ON CONTROL AND OPTIMIZATION (2018)
Exponential convergence under distributed averaging integral frequency control
Erik Weitenberg et al.
AUTOMATICA (2018)
A Jamming-Resilient Algorithm for Self-Triggered Network Coordination
Danial Senejohnny et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)
Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
Yanpeng Guan et al.
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)
TESTING AND DEFENDING METHODS AGAINST DOS ATTACK IN STATE ESTIMATION
Heng Zhang et al.
ASIAN JOURNAL OF CONTROL (2017)
Networked Control Under Random and Malicious Packet Losses
Ahmet Cetinkaya et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2017)
Resilient Event-Triggering H∞ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks
Chen Peng et al.
IEEE TRANSACTIONS ON POWER SYSTEMS (2017)
Networked control systems under Denial-of-Service: Co-located vs. remote architectures
S. Feng et al.
SYSTEMS & CONTROL LETTERS (2017)
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Tasnuva Mahjabin et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)
A sub-optimal method for routing redundancy design over lossy networks
F. Smarra et al.
IFAC PAPERSONLINE (2017)
SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach
Yuzhe Li et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)
Resilient control under Denial-of-Service: Robust design
Shuai Feng et al.
AUTOMATICA (2017)
A multi-channel transmission schedule for remote state estimation under DoS attacks
Kemi Ding et al.
AUTOMATICA (2017)
Event-Triggered Control Systems Under Denial-of-Service Attacks
V. S. Dolk et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)
Optimal Linear Cyber-Attack on Remote State Estimation
Ziyang Guo et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)
Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks
Alessandro D'Innocenzo et al.
AUTOMATICA (2016)
A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop
Lifu Zhang et al.
SENSORS (2016)
ON TRIGGERING CONTROL OF SINGLE-INPUT LINEAR SYSTEMS UNDER PULSE-WIDTH MODULATED DOS SIGNALS
Hamed Shisheh Foroush et al.
SIAM JOURNAL ON CONTROL AND OPTIMIZATION (2016)
Networked control of nonlinear systems under Denial-of-Service
C. De Persis et al.
SYSTEMS & CONTROL LETTERS (2016)
Deception-based Sensor Scheduling for Remote Estimation under DoS Attacks
Kemi Ding et al.
IFAC PAPERSONLINE (2016)
A secure control framework for resource-limited adversaries
Andre Teixeira et al.
AUTOMATICA (2015)
Input-to-State Stabilizing Control Under Denial-of-Service
Claudio De Persis et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)
Optimal Denial-of-Service Attack Scheduling With Energy Constraint
Heng Zhang et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)
Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies
Getachew K. Befekadu et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)
Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
Yuzhe Li et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Tao Shu et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
Hamza Fawzi et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2014)
Stabilization of Uncertain Systems With Finite Data Rates and Markovian Packet Losses
Kunihisa Okano et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2014)
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
Saman Taghavi Zargar et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)
Fault Tolerant Control of Multi-Hop Control Networks
Alessandro D'Innocenzo et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)
JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH
Sourabh Bhattacharya et al.
NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION (2013)
Packet-Hiding Methods for Preventing Selective Jamming Attacks
Alejandro Proano et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)
Denial of Service Attacks in Wireless Networks: The Case of Jammers
Konstantinos Pelechrinis et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)
Protection Against Denial of Service Attacks: A Survey
Georgios Loukas et al.
COMPUTER JOURNAL (2010)
Limitations in remote stabilization over unreliable channels without acknowledgements
Hideaki Ishii
AUTOMATICA (2009)
Optimal Output Feedback Control Using Two Remote Sensors Over Erasure Channels
Vijay Gupta et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2009)
Detecting Malicious Packet Losses
Alper T. Mizrak et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)
CHEMAS: Identify suspect nodes in selective forwarding attacks
Bin Xiao et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2007)
Foundations of control and estimation over lossy networks
Luca Schenato et al.
PROCEEDINGS OF THE IEEE (2007)
A survey of recent results in networked control systems
Joao P. Hespanha et al.
PROCEEDINGS OF THE IEEE (2007)
Jamming sensor networks: Attack and defense strategies
Wenyuan Xu et al.
IEEE NETWORK (2006)
Denial of service in sensor networks
AD Wood et al.
COMPUTER (2002)