Secure estimation and control for cyber-physical systems under adversarial attacks

H Fawzi, P Tabuada, S Diggavi - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The vast majority of today's critical infrastructure is supported by numerous feedback control
loops and an attack on these control loops can have disastrous consequences. This is a …

[图书][B] Cooperative control of multi-agent systems: a consensus region approach

Z Li, Z Duan - 2014 - books.google.com
Distributed controller design is generally a challenging task, especially for multi-agent
systems with complex dynamics, due to the interconnected effect of the agent dynamics, the …

Co-simulation platforms for co-design of networked control systems: An overview

W Li, X Zhang, H Li - Control Engineering Practice, 2014 - Elsevier
This paper gives an overview of the existing co-simulation platforms for co-design of
networked control systems (NCSs). NCSs contain coupled control and communication …

Intrusion detection in cyber-physical systems: Techniques and challenges

S Han, M Xie, HH Chen, Y Ling - IEEE systems journal, 2014 - ieeexplore.ieee.org
Cyber-physical systems (CPSs) integrate the computation with physical processes.
Embedded computers and networks monitor and control the physical processes, usually …

Optimal power management in wireless control systems

K Gatsis, A Ribeiro, GJ Pappas - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper considers the control of a linear plant when plant state information is being
transmitted from a sensor to the controller over a wireless fading channel. The power …

Network-Based Robust Control for Linear Systems With Two-Channel Random Packet Dropouts and Time Delays

L Qiu, Y Shi, F Yao, G Xu, B Xu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper focuses on the robust output feedback ℋ 2/ℋ∞ control issue for a class of
discrete-time networked control systems with uncertain parameters and external …

Resilient control under denial-of-service

C De Persis, P Tesi - IFAC proceedings Volumes, 2014 - Elsevier
We investigate resilient control strategies for linear systems under Denial-of-Service (DoS)
attacks. By DoS attacks we mean interruptions of communication on measurement (sensor …

Formal analysis of timing effects on closed-loop properties of control software

G Frehse, A Hamann, S Quinton… - 2014 IEEE Real-Time …, 2014 - ieeexplore.ieee.org
The theories underlying control engineering and real-time systems engineering use
idealized models that mutually abstract from central aspects of the other discipline. Control …

Towards cyber-physical systems in social spaces: The data reliability challenge

S Wang, D Wang, L Su, L Kaplan… - 2014 IEEE Real-Time …, 2014 - ieeexplore.ieee.org
Today's cyber-physical systems (CPS) increasingly operate in social spaces. Examples
include transportation systems, disaster response systems, and the smart grid, where …

Optimal energy allocation for Kalman filtering over packet dropping links with imperfect acknowledgments and energy harvesting constraints

M Nourian, AS Leong, S Dey - IEEE Transactions on Automatic …, 2014 - ieeexplore.ieee.org
This paper presents a design methodology for optimal transmission energy allocation at a
sensor equipped with energy harvesting technology for remote state estimation of linear …