Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference38 articles.
1. S. Amin, X. Litrico, S.S. Sastry, A.M. Bayen, Stealthy deception attacks on water SCADA systems, in: Proc. of the 13th ACM Int. Conf. on Hybrid Systems: Computation and Control, 2010, pp. 161–170.
2. Decentralized adaptive fuzzy secure control for nonlinear uncertain interconnected systems against intermittent DoS attacks;An;IEEE Trans. Cybern.,2019
3. A.A. Cárdenas, S. Amin, Z.-Y. Lin, Y.-L. Huang, S. Sastry, Attacks against process control systems: Risk assessment, detection, and response, in: Proc. of 6th ACM Symp. Inform. Comput. Commun. Security, 2011, pp. 355–366.
4. A.A. Cárdenas, S. Amin, S. Sastry, Secure control: Towards survivable cyber-physical systems, in: Proc. of the 28th IEEE Int. Conf. on Distributed Computing Systems Workshops, 2008, pp. 495–500.
5. Fully distributed event-triggered protocols for linear multi-agent networks;Cheng;IEEE Trans. Autom. Control,2019
Cited by
42 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献