• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4597353)   Today's Articles (0)   Subscriber (49354)
For: Tahoun AH, Arafa M. Secure control design for nonlinear cyber-physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels. ISA Trans 2022;128:294-308. [PMID: 34953583 DOI: 10.1016/j.isatra.2021.11.033] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/29/2021] [Revised: 11/28/2021] [Accepted: 11/28/2021] [Indexed: 06/14/2023]
Number Cited by Other Article(s)
1
Ma Y, Li Z, Cao Y, Xie X. Secure output consensus for multi-agent systems under edge-based event-trigger against denial-of-service. ISA TRANSACTIONS 2024:1-8. [PMID: 38876951 DOI: 10.1016/j.isatra.2024.05.053] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/25/2023] [Revised: 05/22/2024] [Accepted: 05/31/2024] [Indexed: 06/16/2024]
2
Shi M, Wang X. Event-triggered predictive control for cooperation-competition multi-agent systems under DoS attacks. ISA TRANSACTIONS 2024;149:16-25. [PMID: 38664115 DOI: 10.1016/j.isatra.2024.04.013] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/04/2023] [Revised: 04/11/2024] [Accepted: 04/11/2024] [Indexed: 06/05/2024]
3
Ali MA, Iqbal N, Rehan M. Resilient event-triggered observer-based control of non-linear systems under denial-of-service attacks with actuator saturation. ISA TRANSACTIONS 2024;149:26-43. [PMID: 38719682 DOI: 10.1016/j.isatra.2024.04.021] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/21/2022] [Revised: 04/19/2024] [Accepted: 04/19/2024] [Indexed: 06/05/2024]
4
Shi T, Zhu F. Secure control scheme for CPSs under DoS attacks via multiple transmission channels and unknown input observer. ISA TRANSACTIONS 2023;141:143-156. [PMID: 37451920 DOI: 10.1016/j.isatra.2023.06.040] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/22/2022] [Revised: 06/16/2023] [Accepted: 06/30/2023] [Indexed: 07/18/2023]
5
Ma Y, Sun S. Distributed Optimal and Self-Tuning Filters Based on Compressed Data for Networked Stochastic Uncertain Systems with Deception Attacks. SENSORS (BASEL, SWITZERLAND) 2022;23:335. [PMID: 36616933 PMCID: PMC9823696 DOI: 10.3390/s23010335] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/23/2022] [Revised: 12/16/2022] [Accepted: 12/19/2022] [Indexed: 06/17/2023]
6
Encoding–decoding-based secure filtering for neural networks under mixed attacks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.08.041] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
7
Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks. Sci Rep 2022;12:12849. [PMID: 35896812 PMCID: PMC9329338 DOI: 10.1038/s41598-022-17254-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/05/2022] [Accepted: 07/22/2022] [Indexed: 11/28/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA