4.7 Article

A survey on attack detection, estimation and control of industrial cyber-physical systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Sampled-Based Consensus for Nonlinear Multiagent Systems With Deception Attacks: The Decoupled Method

Ying Cui et al.

Summary: This paper investigates the sampled-based consensus problem for a class of nonlinear multiagent systems subjected to deception attacks, utilizing eigenvectors of Laplacian matrix to construct a novel Lyapunov functional and achieve mean square consensus. The success of deception attacks greatly depends on randomly fluctuated factors, and the solutions of matrix inequalities represent the controller gain matrix for the addressed multiagent systems.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Automation & Control Systems

A New Switched System Approach to Leader-Follower Consensus of Heterogeneous Linear Multiagent Systems With DoS Attack

Dan Zhang et al.

Summary: This study investigates the leader-follower robust H-infinity consensus problem of heterogeneous multiagent systems with denial of service attack, and provides sufficient conditions for solvability. The results show that the consensus protocol design can be transformed into static output feedback control problems, and the gains of the controller can be determined by solving linear matrix inequalities.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Review Automation & Control Systems

Physical Safety and Cyber Security Analysis of Multi-Agent Systems: A Survey of Recent Advances

Dan Zhang et al.

Summary: Multi-agent systems (MASs) have a wide range of applications in smart grids, smart manufacturing, sensor networks, and intelligent transportation systems, but the coordination and cooperation performance are affected by information interaction. Unexpected physical faults and cyber attacks on a single agent may lead to severe degradation of the whole system performance and even destruction.

IEEE-CAA JOURNAL OF AUTOMATICA SINICA (2021)

Article Computer Science, Theory & Methods

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems

Sravani Challa et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

A Markovian jump system approach to consensus of heterogeneous multiagent systems with partially unknown and uncertain attack strategies

Zhenhua Xu et al.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2020)

Article Computer Science, Hardware & Architecture

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

Mohammad Wazid et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Engineering, Electrical & Electronic

Distributed Deception Attack Detection in Platoon-Based Connected Vehicle Systems

Zhiyang Ju et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Automation & Control Systems

Adaptive Event-triggered Control for Networked Switched T-S Fuzzy Systems Subject to False Data Injection Attacks

Yiwen Qi et al.

INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2020)

Article Computer Science, Information Systems

Detection and Isolation of False Data Injection Attacks in Smart Grid via Unknown Input Interval Observer

Xinyu Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Data Integrity Monitoring Method of Digital Sensors for Internet-of-Things Applications

Gong-Xu Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

Summation Detector for False Data-Injection Attack in Cyber-Physical Systems

Dan Ye et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Engineering, Electrical & Electronic

Focusing Matching Localization Method Based on Indoor Magnetic Map

Gong-Xu Liu et al.

IEEE SENSORS JOURNAL (2020)

Article Automation & Control Systems

Resilient Control Design for Load Frequency Control System Under False Data Injection Attacks

Alireza Abbaspour et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2020)

Article Automation & Control Systems

Security Research on Wireless Networked Control Systems Subject to Jamming Attacks

Hongjiu Yang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Automation & Control Systems

Consensus of Heterogeneous Linear Multiagent Systems Subject to Aperiodic Sampled-Data and DoS Attack

Dan Zhang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Automation & Control Systems

Robust Stochastic Sampled-data-based Output Consensus of Heterogeneous Multi-agent Systems Subject to Random DoS Attack: A Markovian Jumping System Approach

Hongjie Ni et al.

INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2019)

Article Automation & Control Systems

Event-based Distributed Filtering Approach to Nonlinear Stochastic Systems over Sensor Networks

Zhongrui Hu et al.

INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2019)

Review Automation & Control Systems

A systems and control perspective of CPS security

Seyed Mehran Dibaji et al.

ANNUAL REVIEWS IN CONTROL (2019)

Article Engineering, Electrical & Electronic

Observer-Based Distributed Secure Consensus Control of a Class of Linear Multi-Agent Systems Subject to Random Attacks

Yang Yang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2019)

Article Engineering, Electrical & Electronic

Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach

Mehmet Necip Kurt et al.

IEEE TRANSACTIONS ON SMART GRID (2019)

Article Automation & Control Systems

ADMM-Based Distributed State Estimation of Smart Grid Under Data Deception and Denial of Service Attacks

Dajun Du et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Article Computer Science, Information Systems

Detection and Isolation of False Data Injection Attacks in Smart Grids via Nonlinear Interval Observer

Xinyu Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach

Dou An et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism

Liwei An et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2018)

Article Automation & Control Systems

Secure estimation for cyber-physical systems with adversarial attacks and unknown inputs: An L-2-gain method

Chun-Hua Xie et al.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2018)

Article Computer Science, Artificial Intelligence

Distributed Filtering for Discrete-Time T-S Fuzzy Systems With Incomplete Measurements

Dan Zhang et al.

IEEE TRANSACTIONS ON FUZZY SYSTEMS (2018)

Article Computer Science, Theory & Methods

Distributed Quickest Detection of Cyber-Attacks in Smart Grid

Mehmet Necip Kurt et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Civil

Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems

Zoleikha Abdollahi Biron et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Attack Detection and Identification for Automatic Generation Control Systems

Amir Ameli et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2018)

Article Automation & Control Systems

Secure filtering for stochastic non-linear systems under multiple missing measurements and deception attacks

Huanhuan Yuan et al.

IET CONTROL THEORY AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries

Wei Ao et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Improved adaptive resilient control against sensor and actuator attacks

Liwei An et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Secure impulsive synchronization control of multi-agent systems under deception attacks

Wangli He et al.

INFORMATION SCIENCES (2018)

Article Automation & Control Systems

Unscented Kalman Filtering for Nonlinear State Estimation with Correlated Noises and Missing Measurements

Long Xu et al.

INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

A survey on security control and attack detection for industrial cyber-physical systems

Derui Ding et al.

NEUROCOMPUTING (2018)

Article Computer Science, Artificial Intelligence

Asynchronous State Estimation for Discrete-Time Switched Complex Networks With Communication Constraints

Dan Zhang et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2018)

Article Automation & Control Systems

Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks

Xin Huang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2018)

Article Automation & Control Systems

Secure Estimation for Cyber-Physical Systems via Sliding Mode

Chengwei Wu et al.

IEEE TRANSACTIONS ON CYBERNETICS (2018)

Article Automation & Control Systems

A Novel Cyber Attack Detection Method in Networked Control Systems

Eman Mousavinejad et al.

IEEE TRANSACTIONS ON CYBERNETICS (2018)

Article Automation & Control Systems

Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks

Derui Ding et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2018)

Article Computer Science, Information Systems

A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems

Rachad Atat et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Theory & Methods

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems

Jairo Giraldo et al.

ACM COMPUTING SURVEYS (2018)

Article Automation & Control Systems

Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks

Dong Wang et al.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2017)

Article Computer Science, Artificial Intelligence

A statistical unsupervised method against false data injection attacks: A visualization-based approach

Mostafa Mohammadpourfard et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions

Jun Zhou et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Computer Science, Information Systems

Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid

Mohammad Esmalifalak et al.

IEEE SYSTEMS JOURNAL (2017)

Article Engineering, Electrical & Electronic

Distributed Filtering for Switched Linear Systems With Sensor Networks in Presence of Packet Dropouts and Quantization

Dan Zhang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2017)

Article Automation & Control Systems

False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey

Ruilong Deng et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Engineering, Electrical & Electronic

Robust Detection of Cyber Attacks on State Estimators Using Phasor Measurements

Junbo Zhao et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2017)

Article Engineering, Electrical & Electronic

Resilient Event-Triggering H∞ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2017)

Article Automation & Control Systems

Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes

Maria Letizia Corradini et al.

IET CONTROL THEORY AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Distributed networked control systems: A brief overview

Xiaohua Ge et al.

INFORMATION SCIENCES (2017)

Article Engineering, Electrical & Electronic

Improved-ELM method for detecting false data attack in smart grid

Liqun Yang et al.

INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS (2017)

Article Automation & Control Systems

Analysis and synthesis of networked control systems: A survey of recent advances and challenges

Dan Zhang et al.

ISA TRANSACTIONS (2017)

Article Automation & Control Systems

Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks

Zhi Feng et al.

IEEE TRANSACTIONS ON CYBERNETICS (2017)

Article Engineering, Electrical & Electronic

Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks

Junbo Zhao et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Engineering, Electrical & Electronic

Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism

Youbiao He et al.

IEEE TRANSACTIONS ON SMART GRID (2017)

Article Automation & Control Systems

Distributed Control of Large-Scale Networked Control Systems With Communication Constraints and Topology Switching

Dan Zhang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2017)

Article Computer Science, Information Systems

Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Review Automation & Control Systems

A review of detection approaches for distributed denial of service attacks

Parneet Kaur et al.

SYSTEMS SCIENCE & CONTROL ENGINEERING (2017)

Article Computer Science, Theory & Methods

A Survey on Malware Detection Using Data Mining Techniques

Yanfang Ye et al.

ACM COMPUTING SURVEYS (2017)

Article Automation & Control Systems

Stochastic Game in Remote Estimation Under DoS Attacks

Kemi Ding et al.

IEEE CONTROL SYSTEMS LETTERS (2017)

Article Automation & Control Systems

Resilient control under Denial-of-Service: Robust design

Shuai Feng et al.

AUTOMATICA (2017)

Article Automation & Control Systems

A multi-channel transmission schedule for remote state estimation under DoS attacks

Kemi Ding et al.

AUTOMATICA (2017)

Article Automation & Control Systems

Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks

Chensheng Liu et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Automation & Control Systems

Event-Triggered Control Systems Under Denial-of-Service Attacks

V. S. Dolk et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Automation & Control Systems

Distributed consensus tracking for multi-agent systems under two types of attacks

Zhi Feng et al.

INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL (2016)

Article Automation & Control Systems

Event-Triggered State Observers for Sparse Sensor Noise/Attacks

Yasser Shoukry et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2016)

Article Automation & Control Systems

On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks

Yilin Mo et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2016)

Article Automation & Control Systems

Recent Advances on Fuzzy-Model-Based Nonlinear Networked Control Systems: A Survey

Jianbin Qiu et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Automation & Control Systems

Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems

Zhong-Hua Pang et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Automation & Control Systems

Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach

Yuan Yuan et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)

Article Automation & Control Systems

Survey on Recent Advances in Networked Control Systems

Xian-Ming Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2016)

Article Automation & Control Systems

Adaptive cyber-physical system attack detection and reconstruction with application to power systems

Wei Ao et al.

IET CONTROL THEORY AND APPLICATIONS (2016)

Review Computer Science, Hardware & Architecture

A survey of network anomaly detection techniques

Mohiuddin Ahmed et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Machine Learning Methods for Attack Detection in the Smart Grid

Mete Ozay et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2016)

Article Computer Science, Information Systems

Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

Linyuan Zhang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Engineering, Electrical & Electronic

Detection of False Data Injection Attacks in Smart Grid Communication Systems

Danda B. Rawat et al.

IEEE SIGNAL PROCESSING LETTERS (2015)

Article Automation & Control Systems

Input-to-State Stabilizing Control Under Denial-of-Service

Claudio De Persis et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)

Article Engineering, Electrical & Electronic

Distributed Bayesian Detection in the Presence of Byzantine Data

Bhavya Kailkhura et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2015)

Article Automation & Control Systems

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Shahaboddin Shamshirband et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2014)

Article Automation & Control Systems

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

Hamza Fawzi et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2014)

Article Automation & Control Systems

Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter

Kebina Manandhar et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2014)

Article Computer Science, Information Systems

Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems

P. Arun Raj Kumar et al.

COMPUTER COMMUNICATIONS (2013)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

Distributed Inference with Byzantine Data [State-of-the-art review on data falsification attacks]

Aditya Vempaty et al.

IEEE SIGNAL PROCESSING MAGAZINE (2013)

Article Automation & Control Systems

Unscented Kalman Filter Over Unreliable Communication Networks With Markovian Packet Dropouts

Li Li et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)

Article Automation & Control Systems

H-infinity Filtering for Networked Systems With Multiple Time-Varying Transmissions and Random Packet Dropouts

Dan Zhang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2013)

Article Automation & Control Systems

H-infinity Controller Design of Networked Control Systems With Markov Packet Dropouts

Dong Wang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2013)

Proceedings Paper Engineering, Electrical & Electronic

H∞ Filtering for a Class of Networked Control Systems with Packet Dropouts

Huajing Zhang et al.

MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4 (2013)

Article Computer Science, Information Systems

Real time DDoS detection using fuzzy estimators

Stavros N. Shiaeles et al.

COMPUTERS & SECURITY (2012)

Article Engineering, Electrical & Electronic

Network-Based H∞ Filtering for Discrete-Time Systems

Xian-Ming Zhang et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2012)

Article Engineering, Electrical & Electronic

Cyber-Physical Systems: A Perspective at the Centennial

Kyoung-Dae Kim et al.

PROCEEDINGS OF THE IEEE (2012)

Article Automation & Control Systems

Mean square stability for Kalman filtering with Markovian packet losses

Keyou You et al.

AUTOMATICA (2011)

Article Engineering, Electrical & Electronic

A Switched System Approach to Networked H∞ Filtering with Packet Losses

Shu Yin et al.

CIRCUITS SYSTEMS AND SIGNAL PROCESSING (2011)

Article Computer Science, Information Systems

Distributed denial of service attack detection using an ensemble of neural classifier

P. Arun Raj Kumar et al.

COMPUTER COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks

Ankit Singh Rawat et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2011)

Article Automation & Control Systems

Stabilization of Sampled-Data Control Systems With Control Inputs Missing

Wen-An Zhang et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2010)

Article Automation & Control Systems

Networked Control System: Overview and Research Trends

Rachana Ashok Gupta et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2010)

Article Automation & Control Systems

Robust filtering with stochastic nonlinearities and multiple missing measurements

Guoliang Wei et al.

AUTOMATICA (2009)

Article Computer Science, Information Systems

H∞ filtering of networked discrete-time systems with random packet losses

Wen-An Zhang et al.

INFORMATION SCIENCES (2009)

Article Computer Science, Hardware & Architecture

A denial of service detector based on maximum likelihood detection and the random neural network

Guelay Oeke et al.

COMPUTER JOURNAL (2007)

Article Automation & Control Systems

Output feedback stabilization of networked control systems with packet dropouts

Wen-An Zhang et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2007)

Article Automation & Control Systems

Robust H∞ control for networked systems with random packet losses

Zidong Wang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS (2007)

Article Automation & Control Systems

Design of networked control systems with packet dropouts

Jing Wu et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2007)

Article Automation & Control Systems

Stability of Kalman filtering with Markovian packet losses

Minyi Huang et al.

AUTOMATICA (2007)

Article Automation & Control Systems

Delayed observers for linear systems with unknown inputs

Shreyas Sundaram et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2007)

Review Engineering, Electrical & Electronic

Control and communication challenges in networked real-time systems

John Baillieul et al.

PROCEEDINGS OF THE IEEE (2007)

Article Engineering, Electrical & Electronic

A survey of recent results in networked control systems

Joao P. Hespanha et al.

PROCEEDINGS OF THE IEEE (2007)

Article Computer Science, Hardware & Architecture

Real-time detection of distributed denial-of-service attacks using RBF networks and statistical features

D Gavrilis et al.

COMPUTER NETWORKS (2005)

Article Automation & Control Systems

Kalman filtering with intermittent observations

B Sinopoli et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2004)

Article Engineering, Electrical & Electronic

Asymptotic results for decentralized detection in power constrained wireless sensor networks

JF Chamberland et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2004)