• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4604948)   Today's Articles (66)   Subscriber (49371)
For: Zhang D, Wang QG, Feng G, Shi Y, Vasilakos AV. A survey on attack detection, estimation and control of industrial cyber-physical systems. ISA Trans 2021;116:1-16. [PMID: 33581894 DOI: 10.1016/j.isatra.2021.01.036] [Citation(s) in RCA: 28] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/10/2020] [Revised: 12/14/2020] [Accepted: 01/19/2021] [Indexed: 06/12/2023]
Number Cited by Other Article(s)
1
Wu X, Yang X, Huang J, Shardt YAW. A remaining useful life prediction algorithm incorporating real-time and integrated model for hidden actuator degradation. ISA TRANSACTIONS 2024:S0019-0578(24)00236-2. [PMID: 38839549 DOI: 10.1016/j.isatra.2024.05.033] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/22/2023] [Revised: 05/19/2024] [Accepted: 05/19/2024] [Indexed: 06/07/2024]
2
Geng Q, Li J, Li L. Dynamic event-triggered control for CPSs under QoS-based variable sampling approach. ISA TRANSACTIONS 2024:S0019-0578(24)00233-7. [PMID: 38821850 DOI: 10.1016/j.isatra.2024.05.030] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/03/2023] [Revised: 05/16/2024] [Accepted: 05/16/2024] [Indexed: 06/02/2024]
3
Li J, Wang L, Xi J, Xia K, Gao J, Zheng Y. Induced attack with prescribed consensus trajectory against multiagent systems. ISA TRANSACTIONS 2024;146:274-284. [PMID: 38242734 DOI: 10.1016/j.isatra.2024.01.015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/05/2023] [Revised: 12/02/2023] [Accepted: 01/12/2024] [Indexed: 01/21/2024]
4
Chen Y, Xu H, Dong L, Li Z. Fully distributed secure observation and consensus for multi-agent systems with uncertain communication topology. ISA TRANSACTIONS 2024;145:176-189. [PMID: 37996358 DOI: 10.1016/j.isatra.2023.11.026] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/14/2022] [Revised: 10/25/2023] [Accepted: 11/17/2023] [Indexed: 11/25/2023]
5
Piao X, Lin C, Zhang M, Chen B. Attack estimation and state reconstruction for cyber-physical systems with state delay via reduced-order observer. ISA TRANSACTIONS 2024;144:11-17. [PMID: 37891071 DOI: 10.1016/j.isatra.2023.10.013] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/15/2022] [Revised: 08/23/2023] [Accepted: 10/13/2023] [Indexed: 10/29/2023]
6
Sun Y, Ju Y, Ding D, Liu H. Distributed H filtering of replay attacks over sensor networks. ISA TRANSACTIONS 2023;141:113-120. [PMID: 37156690 DOI: 10.1016/j.isatra.2023.04.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/03/2022] [Revised: 04/05/2023] [Accepted: 04/14/2023] [Indexed: 05/10/2023]
7
Li Z, Xu H, Lin Z, Dong L, Chen Y. Event-triggered robust distributed output feedback model predictive control for nonlinear MASs against false data injection attacks. ISA TRANSACTIONS 2023;141:197-211. [PMID: 37481438 DOI: 10.1016/j.isatra.2023.06.039] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/08/2023] [Revised: 06/18/2023] [Accepted: 06/30/2023] [Indexed: 07/24/2023]
8
Li YG, Yang GH, Wang X. Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: A fusion attack approach. ISA TRANSACTIONS 2023;137:1-12. [PMID: 36725413 DOI: 10.1016/j.isatra.2023.01.020] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/02/2022] [Revised: 01/12/2023] [Accepted: 01/14/2023] [Indexed: 06/04/2023]
9
Mei Z, Li Z, Su L, Wang J, Li F. Quantized H filtering for networked persistent dwell-time switched piecewise-affine systems. ISA TRANSACTIONS 2023;136:173-181. [PMID: 36336471 DOI: 10.1016/j.isatra.2022.10.017] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/01/2022] [Revised: 10/15/2022] [Accepted: 10/15/2022] [Indexed: 05/16/2023]
10
Chen J, Liu B, Li T, Hu Y. Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems. SENSORS (BASEL, SWITZERLAND) 2023;23:1957. [PMID: 36850552 PMCID: PMC9959309 DOI: 10.3390/s23041957] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2022] [Revised: 01/24/2023] [Accepted: 02/06/2023] [Indexed: 06/18/2023]
11
Zhang W, Zhang BL, Han QL, Pang FB, Sun YT, Zhang XM. Recoil attenuation for deepwater drilling riser systems via delayed H control. ISA TRANSACTIONS 2023;133:248-261. [PMID: 35863933 DOI: 10.1016/j.isatra.2022.07.003] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/16/2022] [Revised: 06/08/2022] [Accepted: 07/05/2022] [Indexed: 06/15/2023]
12
Zhang D, Ye Z, Feng G, Li H. Intelligent Event-Based Fuzzy Dynamic Positioning Control of Nonlinear Unmanned Marine Vehicles Under DoS Attack. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:13486-13499. [PMID: 34860659 DOI: 10.1109/tcyb.2021.3128170] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
13
Yang F, Gu Z, Hua L, Yan S. A resource-aware control approach to vehicle platoons under false data injection attacks. ISA TRANSACTIONS 2022;131:367-376. [PMID: 35581023 DOI: 10.1016/j.isatra.2022.04.046] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/30/2021] [Revised: 04/28/2022] [Accepted: 04/28/2022] [Indexed: 06/15/2023]
14
Agrawal N, Kumar R. Security Perspective Analysis of Industrial Cyber Physical Systems (I-CPS): A Decade-wide Survey. ISA TRANSACTIONS 2022;130:10-24. [PMID: 35396141 DOI: 10.1016/j.isatra.2022.03.018] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/19/2021] [Revised: 03/21/2022] [Accepted: 03/21/2022] [Indexed: 06/14/2023]
15
Koay AMY, Ko RKL, Hettema H, Radke K. Machine learning in industrial control system (ICS) security: current landscape, opportunities and challenges. J Intell Inf Syst 2022. [DOI: 10.1007/s10844-022-00753-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
16
Lu Q, Chen J, Wang Q, Zhang D, Sun M, Su CY. Practical fixed-time trajectory tracking control of constrained wheeled mobile robots with kinematic disturbances. ISA TRANSACTIONS 2022;129:273-286. [PMID: 35039151 DOI: 10.1016/j.isatra.2021.12.039] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Revised: 12/09/2021] [Accepted: 12/31/2021] [Indexed: 06/14/2023]
17
Shao J, Ye Z, Zhang D, Yan H, Zhu J. Injection attack estimation of networked control systems subject to hidden DoS attack. ISA TRANSACTIONS 2022;129:1-14. [PMID: 35216804 DOI: 10.1016/j.isatra.2022.02.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/04/2021] [Revised: 01/20/2022] [Accepted: 02/05/2022] [Indexed: 06/14/2023]
18
Zhang Z, Li F, Fang T, Shi K, Shen H. Event-triggered H/passive synchronization for Markov jumping reaction-diffusion neural networks under deception attacks. ISA TRANSACTIONS 2022;129:36-43. [PMID: 35031128 DOI: 10.1016/j.isatra.2021.12.035] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/26/2021] [Revised: 11/28/2021] [Accepted: 12/24/2021] [Indexed: 06/14/2023]
19
Liu S, Cheng J, Zhang D, Yan H, Park JH. Saturation control for fuzzy markovian switching systems with singularly perturbation and cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.07.088] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
20
Huang Z, Lv W, Chen H, Rao H, Xu Y. Consensus-based distributed receding horizon estimation. ISA TRANSACTIONS 2022;128:106-114. [PMID: 34756756 DOI: 10.1016/j.isatra.2021.10.015] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/16/2021] [Revised: 10/12/2021] [Accepted: 10/13/2021] [Indexed: 06/13/2023]
21
Narasimhan S, El‐Farra NH, Ellis MJ. A Control‐Switching Approach for Cyberattack Detection in Process Systems with Minimal False Alarms. AIChE J 2022. [DOI: 10.1002/aic.17875] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
22
Chen X, Hu C, Tian E, Peng C. Event-based fuzzy resilient control of nonlinear DC Microgrids under denial-of-service attacks. ISA TRANSACTIONS 2022;127:206-215. [PMID: 35525605 DOI: 10.1016/j.isatra.2022.04.019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/25/2021] [Revised: 03/17/2022] [Accepted: 04/12/2022] [Indexed: 06/14/2023]
23
Xie J, Zhu S, Zhang D. Distributed interval state estimation with l-gain optimization for cyber-physical systems subject to bounded disturbance and random stealthy attacks. ISA TRANSACTIONS 2022;127:22-31. [PMID: 35086672 DOI: 10.1016/j.isatra.2022.01.010] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/16/2021] [Revised: 01/06/2022] [Accepted: 01/06/2022] [Indexed: 06/14/2023]
24
Yu Y, Liu GP, Hu W. Security tracking control for discrete-time stochastic systems subject to cyber attacks. ISA TRANSACTIONS 2022;127:133-145. [PMID: 35216807 DOI: 10.1016/j.isatra.2022.02.001] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/19/2021] [Revised: 01/29/2022] [Accepted: 02/02/2022] [Indexed: 06/14/2023]
25
Zha L, Liao R, Liu J, Cao J, Xie X. Dynamic event-triggered security control of cyber-physical systems against missing measurements and cyber-attacks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.05.096] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
26
Event-based security tracking control for networked control systems against stochastic cyber-attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.085] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
27
Padhan S, Turuk AK. Design of false data injection attacks in cyber-physical systems. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.06.082] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
28
Wang H, Cheng J, Yan H, Shi K, Qi W. Component-based dynamic event-triggered control for nonlinear singularly perturbed systems: A gain-scheduling method. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.01.069] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
29
He N, Ma K, Li R. Toward Optimal False Data Injection Attack against Self‐Triggered Model Predictive Controllers. ADVANCED THEORY AND SIMULATIONS 2022. [DOI: 10.1002/adts.202200025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
30
Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring. Symmetry (Basel) 2021. [DOI: 10.3390/sym13122425] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA