Author:
Zhu Minghui,Martínez Sonia
Subject
Electrical and Electronic Engineering,Control and Systems Engineering
Reference41 articles.
1. Network security: a decision and game theoretic approach;Alpcan,2011
2. Amin, S., Litrico, X., Sastry, S.S., & Bayen, A.M. (2010). Stealthy deception attacks on water SCADA systems. In Hybrid systems: computation and control (pp. 161–170) Stockholm, Sweden.
3. Security of interdependent and identical networked control systems;Amin;Automatica,2013
4. Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2011). Risk-sensitive control under a class of denial-of-service attack models. In American control conference (pp. 643–648). San Francisco, USA, June.
5. The explicit linear quadratic regulator for constrained systems;Bemporad;Automatica,2002
Cited by
55 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献