共 24 条
- [11] AHMED M,, MAHMOOD A N,, HU J K., A survey of network anomaly detection techniques [J], Journal of Network and Computer Applications, 60, pp. 19-31, (2016)
- [12] ZHUANG Kangxi, SUN Ziwen, Establishing a detection model for denial of service attacks in industrial cyber physical systems [J], Control Theory Applications, 37, 3, pp. 629-638, (2020)
- [13] PERSIS C D, TESI P., Input-to-state stabilizing control under denial-of-service [J]., IEEE Transactions on Automatic Control, 60, 11, pp. 2930-2944, (2015)
- [14] FENG S, TESI P., Networked control systems under denial-of-service: co-located vs. remote architectures [J], Systems & Control Letters, 108, pp. 40-47, (2017)
- [15] FENG S, TESI P., Resilient control under denial-of-service:Robust design [J].Automatica, 79, pp. 42-51, (2017)
- [16] WANG Mufeng, Bugong XU, Guaranteed cost control for a class of cyber-physical systems under DoS attacks [J]. Journal of South China University of Technology, 46, 8, pp. 19-26, (2018)
- [17] AGARWAL R K, Robust H∞ pinning synchronization for complex networks with event-triggered communication scheme, IEEE Transactions on Circuits and Systems I:Regular Papers, 69, 12, pp. 5233-5245, (2020)
- [18] HEEMELS W,, DONKERS M., Periodic event-triggered control for linear systems [J], IEEE Transactions on Automatic Control, 49, 3, pp. 698-711, (2013)
- [19] Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks [J], IEEE Transactions on Cybernetics, 49, 12, pp. 4271-4281, (2019)
- [20] Adaptive event-triggered controller design for cyber-physical systems with complex cyber-attacks, Proceedings of the 2019 Chinese Automation Congress(CAC), pp. 4202-4207, (2019)