Secure control of multiagent systems against malicious attacks: A brief survey

W He, W Xu, X Ge, QL Han, W Du… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Multiagent systems (MASs) provide an effective means for coordinating spatially distributed
and networked agents (or nodes, subsystems) such that the desired cooperative tasks can …

Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications

J Lin, W Yu, N Zhang, X Yang… - IEEE internet of things …, 2017 - ieeexplore.ieee.org
Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to
enable computing services devices deployed at network edge, aiming to improve the user's …

Distributed Krein space-based attack detection over sensor networks under deception attacks

X Ge, QL Han, M Zhong, XM Zhang - Automatica, 2019 - Elsevier
This paper is concerned with distributed attack detection for a discrete time-varying system
monitored by a sensor network. An adversary simultaneously launches distinct data …

Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT

F Farivar, MS Haghighi, A Jolfaei… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
This article proposes a hybrid intelligent-classic control approach for reconstruction and
compensation of cyber attacks launched on inputs of nonlinear cyber-physical systems …

Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks

S Hu, D Yue, X Xie, X Chen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, the event-based controller synthesis problem for networked control systems
under the resilient event-triggering communication scheme (RETCS) and periodic denial-of …

Input-to-state stabilizing control under denial-of-service

C De Persis, P Tesi - IEEE Transactions on Automatic Control, 2015 - ieeexplore.ieee.org
The issue of cyber-security has become ever more prevalent in the analysis and design of
networked systems. In this paper, we analyze networked control systems in the presence of …

Adaptive neural self-triggered bipartite secure control for nonlinear MASs subject to DoS attacks

F Cheng, H Liang, B Niu, N Zhao, X Zhao - Information Sciences, 2023 - Elsevier
This paper studies the bipartite secure control design problem for nonlinear multi-agent
systems (MASs) subject to denial-of-service (DoS) attacks over a signed digraph. By …

Summation detector for false data-injection attack in cyber-physical systems

D Ye, TY Zhang - IEEE transactions on cybernetics, 2019 - ieeexplore.ieee.org
In this paper, from the perspectives of defenders, we consider the detection problems of
false data-injection attacks in cyber-physical systems (CPSs) with white noise. The false …

Security, privacy, and safety aspects of civilian drones: A survey

R Altawy, AM Youssef - ACM Transactions on Cyber-Physical Systems, 2016 - dl.acm.org
The market for civilian unmanned aerial vehicles, also known as drones, is expanding
rapidly as new applications are emerging to incorporate the use of civilian drones in our …