Author:
Severson Tracie A.,Croteau Brien,Rodríguez-Seda Erick J.,Kiriakidis Kiriakos,Robucci Ryan,Patel Chintan
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Science Applications,Control and Systems Engineering
Reference66 articles.
1. Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks;Amin;IEEE Transactions on Control Systems Technology,2013
2. Algebraic graph theory;Biggs,1993
3. Average consensus on arbitrary strongly connected digraphs with time-varying topologies;Cai;IEEE Transactions on Automatic Control,2014
4. Network delay predictive compensation based on time-delay modelling as disturbance;Caruntu;International Journal of Control,2014
5. Cross-level detection framework for attacks on cyber-physical systems;Croteau;Journal of Hardware and Systems Security,2017
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献