References
- Aumasson, J.-P., Meier, W., Phan, R., & Henzen, L. (2014). The hash function BLAKE. Springer Publishing Company.
- Chang, H. L. (2004). Robust observer-based control of systems with state perturbations via lmi approach. IEEE, Transactions on Automatic Control, 8, 1365–1370. https://doi.org/10.1109/TAC.2004.832660
- Corradini, M. L., & Cristofaro, A. (2017). Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes. IET Control Theory and Applications, 11(11). https://doi.org/10.1049/iet-cta.2016.1313
- Davoodi, M. R., Gallehdari, Z., Saboori, I., Rezaee, H., Semsar-Kazerooni, E., Meskin, N., Abdollahi, F., & Khorasani, K. (2016). An overview of cooperative and consensus control of multi-agent systems. In Wiley encyclopedia of electrical and electronics engineering. John Wiley & Sons Ltd. https://doi.org/10.1899/15-9834.6.
- Davoodi, M. R., Golabi, A., Talebi, H. A., & Momeni, H. R. (2013). Simultaneous fault detection and control design for switched linear systems based on dynamic observer. Optimal Control Applications and Methods, 34, 35–52. https://doi.org/10.1002/oca.1026
- Davoodi, M. R., Khorasani, K., Talebi, H. A., & Momeni, H. (2008). Distributed fault detection and isolation filter design for a network of heterogeneous multi-agent systems. IEEE Transactions on Control Systems Technology, 22, 1061–1069. https://doi.org/10.1109/TCST.87
- Davoodi, M. R., Meskin, N., & Khorasani, K. (2016). Simultaneous fault detection and consensus control design for a network of multi-agent systems. Automatica, 66, 185–194. https://doi.org/10.1016/j.automatica.2015.12.027
- Davoodi, M. R., Meskin, N., & Khorasani, K. (2017). Integrated design of fault detection, isolation, and control for continuous-time markovian jump systems. International Journal of Adaptive Control and Signal Processing, 31, 1903–1919. https://doi.org/10.1002/acs.v31.12
- Etemadi, N. (1981). An elementary proof of the strong law of large numbers. Zeitschrift für Wahrscheinlichkeitstheorie und verwandte Gebiete, 55, 119–122. https://doi.org/10.1007/BF01013465
- Feng, Z., & Allen, R. (2003). Reduced order H∞ control of an autonomous underwater vehicle. IFAC Proceedings Volumes, 36, 121–126. https://doi.org/10.1016/S1474-6670(17)36668-5
- Feng, Z., & Allen, R. (2004). Reduced order H∞ control of an autonomous underwater vehicle. Control Engineering Practice, 12, 1511–1520. Guidance and control of underwater vehicles. https://doi.org/10.1016/j.conengprac.2004.02.004
- Gallehdari, Z., Meskin, N., & Khorasani, K. (2016). A distributed control reconfiguration and accommodation for consensus achievement of multiagent systems subject to actuator faults. IEEE Transactions on Control Systems Technology, 24, 2031–2047. https://doi.org/10.1109/TCST.2016.2526639
- Gallehdari, Z., Meskin, N., & Khorasani, K. (2017a). Distributed reconfigurable control strategies for switching topology networked multi-agent systems. ISA Transactions, 71, 51–67. https://doi.org/10.1016/j.isatra.2017.06.008
- Gallehdari, Z., Meskin, N., & Khorasani, K. (2017b). An H∞ cooperative fault recovery control of multi-agent systems. Automatica, 84, 101–108. https://doi.org/10.1016/j.automatica.2017.07.017
- Guan, Y., & Ge, X. (2018). Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks, 4(1), 48–59. https://doi.org/10.1109/TSIPN.2017.2749959
- Hajshirmohamadi, S., Askari, J., & Hoseinnia, S. (2013). Simultaneous fault detection and control for switched linear systems: An LMI approach. In 21st Iranian conference in electrical engineering (ICEE) (pp. 1–6).
- Khazraei, A., Kebriaei, H., & Salmasi, F. R. (2017). Replay attack detection in a multi agent system using stability analysis and loss effective watermarking. In American control conference. Elsevier
- Khosrowjerdi, M. J., Nikoukhah, R., & Safari-Shad, N. (2004). A mixed H2/ H∞ approach to simultaneous fault detection and control. Automatica, 40, 261–267. https://doi.org/10.1016/j.automatica.2003.09.011
- Li, Y., Voos, H., Darouach, M., & Hua, C. (2015). An algebraic detection approach for control systems under multiple stochastic cyberattacks. IEEE/CAA Journal of Automatica Sinica, 2, 258–266. https://doi.org/10.1109/JAS.2015.7152659
- Meng, X., & Yang, G. H. (2014). Simultaneous fault detection and control for stochastic time-delay systems. International Journal of Systems Science, 45, 1058–1069. https://doi.org/10.1080/00207721.2012.745021
- Miao, F., Zhu, Q., Pajic, M., & Pappas, G. J. (2017). Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Transactions on Control of Network Systems, 4, 106–117. https://doi.org/10.1109/TCNS.2016.2573039
- Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In 49th IEEE conference on decision and control (CDC). IEEE.
- Nazari, S., & Shafai, B. (2016). Distributed detection filter design for intruder identification. In American control conference. IEEE
- Pajic, M., Lee, I., & Pappas, G. J. (2017). Attack-resilient state estimation for noisy dynamical systems. IEEE Transactions on Control of Network Systems, 4(1), 82–92. https://doi.org/10.1109/TCNS.2016.2607420
- Pasqualetti, F., Bicchi, A., & Bullo, F. (2007). Distributed intrusion detection for secure consensus computations. In 46th IEEE conference on decision and control. IEEE.
- Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(1), 2715–2729. https://doi.org/10.1109/TAC.2013.2266831
- Pipeleers, G., Demeulenaere, B., Swevers, J., & Vandenberghe, L. (2009). Extended lmi characterizations for stability and performance of linear systems. Systems & Control Letters, 58, 510–518. https://doi.org/10.1016/j.sysconle.2009.03.001
- Saboori, I., & Khorasani, K. (2015). Actuator fault accommodation strategy for a team of multi-agent systems subject to switching topology. Automatica, 62, 200–207. https://doi.org/10.1016/j.automatica.2015.09.025
- Shames, I., Teixeira, A. H., Sandberg, H., & Johansson, K. H. (2010). Distributed fault detection for interconnected systems. Automatica, 47, 2757–2764. https://doi.org/10.1016/j.automatica.2011.09.011
- Teixeira, A., Sou, K. C., Sandberg, H., & Johansson, K. H. (2013). Quantifying cyber-security for networked control systems. In Control of cyber-physical systems, Control and information science series: Vol. 449, Springer.
- Wang, G., & Liu, M. (2015). Fault detection for discrete-time systems with fault signal happening randomly: The Markov approach. IEEE Access, 5, 14680–14689. https://doi.org/10.1109/ACCESS.2017.2732831
- Wang, D., & Wang, W. (2014). Distributed fault detection and isolation for discrete time multi-agent systems. Computational Intelligence, Networked Systems and Their Applications, 462, 496–505. https://doi.org/10.1007/978-3-662-45261-5
- Wang, H., & Yang, G. H. (2009). Simultaneous fault detection and control for uncertain linear discrete-time systems. IET Control Theory Applications, 3, 583–594. https://doi.org/10.1049/iet-cta.2007.0463
- Zhang, F. (2005). The schur complement and its applications (Vol. 4). Springer.
- Zhang, Z., & Jaimoukha, I. M. (2014). On-line fault detection and isolation for linear discrete-time uncertain systems. Automatica, 50, 513–518. https://doi.org/10.1016/j.automatica.2013.11.003