References
- Chen, R., Li, X., Zhong, H., & Fei, M. (2018). A novel online detection method of data injection attack against dynamic state estimation in smart grid. Neurocomputing. DOI:10.1016/j.neucom.2018.09.094
- Dazhong, Z. (2002). Linear systems theory. Beijin: Tsinghua Press.
- Di Benedetto, M. D., D'Innocenzo, A., & Smarra, F. (2014). Fault-tolerant control of a wireless HVAC control system. International symposium on communications, control and signal processing (pp. 235–238), Athens, Greece.
- D'Innocenzo, A., Di Benedetto, M. D., & Serra, E. (2013). Fault tolerant control of multi-hop control networks. IEEE Transactions on Automatic Control, 58(6), 1377–1389. doi: 10.1109/TAC.2012.2235719
- D'Innocenzo, A., Di Benedetto, M. D., & Smarra, F. (2013). Fault detection and isolation of malicious nodes in MIMO multi-hop control networks. 52nd IEEE conference on decision and control (pp. 5276–5281), Florence, Italy.
- D'Innocenzo, A., Smarra, F., & Di Benedetto, M. D. (2016). Resilient stabilization of multi-hop control networks subject to malicious attacks. Automatica, 71, 1–9. doi: 10.1016/j.automatica.2016.04.016
- Du, D., Chen, R., Li, X., Wu, L., Zhou, P., & Fei, M. (2018). Malicious data deception attacks against power systems: A new case and its detection method. Transactions of the Institute of Measurement and Control. DOI:10.1177/0142331217740622
- Du, D., Li, X., Li, W., Chen, R., Fei, M., & Wu, L. (2019). ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems. DOI:10.1109/TSMC.2019.2896292
- Du, D., Qi, B., Fei, M., & Peng, C. (2015). Multiple event-triggered H2/H∞ filtering for hybrid networked systems with random network-induced delays. Information Sciences, 325, 393–408. doi: 10.1016/j.ins.2015.07.026
- Du, D., Qi, B., Fei, M., & Wang, Z. (2017). Quantized control of distributed event-triggered networked control systems with hybrid wired-wireless networks communication constraints. Information Sciences, 380, 74–91. doi: 10.1016/j.ins.2016.03.033
- Faragher, R. (2012). Understanding the basis of the Kalman filter via a simple and intuitive derivation. IEEE Signal Processing Magazine, 29(5), 128–132. doi: 10.1109/MSP.2012.2203621
- Feng, Z., Zhu, J., & Allen, R. (2007). Design of continuous and discrete LQI control systems with stable inner Loops. Journal of Shanghai Jiao Tong University (Science), E-12(6), 787–792.
- Gong, D. (2004). Theoretical introduction to discrete control system. Beijin: China Railway Press.
- Gu, G. (2012). Discrete-time linear systems theory and design with applications. New York, NY: Springer.
- Gupta, V., Dana, A. F., Hespanha, J. P., Murray, R. M., & Hassibi, B. (2009). Data transmission over networks for estimation and control. IEEE Transactions on Automatic Control, 54(8), 1807–1819. doi: 10.1109/TAC.2009.2024567
- Han, C., Jia, L., & Peng, D. (2018). Model predictive control of batch processes based on two-dimensional integration frame. Nonlinear Analysis: Hybrid Systems, 28, 75–86.
- Hespanha, J. P. (2009). Linear systems theory. Princeton, NJ: Princeton Press.
- Hu, L., Wang, Z., Han, Q. L., & Liu, X. (2018). State estimation under false data injection attacks: Security analysis and system protection. Automatica, 87, 176–183. doi: 10.1016/j.automatica.2017.09.028
- Jie, X., Wang, H., Fei, M., Du, D., Sun, Q., & Yang, T. C. (2018). Anomaly behavior detection and reliability assessment of control systems based on association rules. International Journal of Critical Infrastructure Protection, 22, 90–99. doi: 10.1016/j.ijcip.2018.06.001
- Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379. doi: 10.1109/TCNS.2014.2357531
- Mao, S., & Zhou, J. (2007). Probability theory and mathematical statistics. Beijin: China Statistics Press.
- Markam, V., & Dubey, L. S. M. (2012). A general study of associations rule mining in intrusion detection system. International Journal of Emerging Technology and Advanced Engineering, 2(1), 347–356.
- Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. 49th IEEE conference on decision and control (pp. 5967–5972), Atlanta, GA, USA.
- Nisbina, H., Umakoshi, K., & Hashimoto, Y. (1997). Control of air temperature in nursery plants production system by LQI control with Kalman filter. IFAC Proceedings Volumes, 30(26), 13–18. doi: 10.1016/S1474-6670(17)41238-9
- Pajic, M., Sundaram, S., Pappas, G. J., & Mangharam, R. (2011). The wireless control network: A new approach for control over networks. IEEE Transactions on Automatic Control, 56(10), 2305–2318. doi: 10.1109/TAC.2011.2163864
- Parwekar, P, Rodda, S, & Kaur, P. (2018). Mobile sink as checkpoints for fault detection towards fault tolerance in wireless sensor networks. Journal of Global Information Management, 26(3), 78–89. doi: 10.4018/JGIM.2018070106
- Prakash, J., Patwardhan, S. C., & Narasimhan, S. (2002). A supervisory approach to fault-tolerant control of linear multivariable systems. Industrial & Engineering Chemistry Research, 41(9), 2270–2281. doi: 10.1021/ie010030q
- Rajeev, Alur., Alessandro, D'Innocenzo., Karl H., H.Johansson., George J., Pappas., & Gera, Weiss. (2009). Modeling and analysis of multi-hop control networks. 15th IEEE real-time and embedded technology and applications symposium (pp. 223–232), San Francisco, CA, USA.
- Ramachandran, K. M., & Tsokos, C. P. (2015). Mathematical statistics with applications in R (2nd ed.). Salt Lake City, UT: Academic Press.
- Rezha, F. P., & Shin, S. Y. (2014). Performance analysis of ISA100.11a under interference from an IEEE 802.11b wireless network. IEEE Transactions on Industrial Informatics, 10(2), 919–927. doi: 10.1109/TII.2014.2307016
- Smarra, F., D'Innocenzo, A., & Di Benedetto, M. D. (2012). Fault tolerant stabilizability of MIMO multi-hop control networks. Proceedings of the 3rd IFAC workshop on distributed estimation and control in networked systems (pp. 79–84), Santa Barbara, CA, USA.
- Song, J., Han, S., Mok, A., Chen, D., Lucas, M., Nixon, M., & Pratt, W. (2008b). WirelessHART: Applying wireless technology in real-time industrial process control. IEEE real-time and embedded technology and applications symposium (pp. 377–386), St. Louis, MO, USA.
- Song, J., Han, S., Zhu, X., Mok, A., Chen, D., & Nixon, M. (2008a). Demo abstract: A complete wirelessHART network. Proceedings of the 6th ACM conference on embedded network sensor systems (pp. 381–382), Raleigh, NC, USA.
- Sun, Q., Lim, C., Shi, P., & Liu, F. (2018). Design and stability of moving horizon estimator for Markov jump linear systems. IEEE Transactions on Automatic Control. DOI:10.1109/TAC.2018.2816102
- Tajbakhsh, A., Rahmati, M., & Mirzaei, A. (2009). Intrusion detection using fuzzy association rules. Applied Soft Computing, 9, 462–469. doi: 10.1016/j.asoc.2008.06.001
- Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer networks. Upper Saddle River, NJ: Prentice Hall.
- Tarokh, M. (1986). Frequency-domain criteria for controllability and observability of multivariable systems. Proceedings of the American control conference (pp. 18–20), Seattle, WA, USA.
- Wang, M., Qiu, J., & Feng, G. (2018a). Finite frequency memory output feedback controller design for T–S fuzzy dynamical systems. IEEE Transactions on Fuzzy Systems, 26(6), 3301–3313. doi: 10.1109/TFUZZ.2018.2821654
- Wang, M., Qiu, J., & Feng, G. (2018b). A novel piecewise affine filtering design for T–S fuzzy affine systems using past output measurements. IEEE Transactions on Cybernetics. doi:10.1109/TCYB.2018.2883476
- Wang, M., Qiu, J., & Feng, G. (2018c). Finite frequency filtering design for uncertain discrete-time systems using past output measurements. IEEE Transactions on Circuits and Systems I: Regular Papers, 65(9), 3005–3013. doi: 10.1109/TCSI.2018.2824315
- Wang, T., Qiu, J., Fu, S., & Ji, W. (2017). Distributed fuzzy H∞ filtering for nonlinear multirate networked double-layer industrial processes. IEEE Transactions on Industrial Electronics, 64(6), 5203–5211. doi: 10.1109/TIE.2016.2622234
- Wang, T., Qiu, J., Gao, H., & Wang, C. (2017). Network-based fuzzy control for nonlinear industrial processes with predictive compensation strategy. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 47(8), 2137–2147. doi: 10.1109/TSMC.2016.2616904
- Wang, T., Qiu, J., Yin, S., Gao, H., Fan, J., & Chai, T. (2016). Performance-based adaptive fuzzy tracking control for networked industrial processes. IEEE Transactions on Cybernetics, 46(8), 1760–1770. doi: 10.1109/TCYB.2016.2551039
- Welch, G., & Bishop, G. (2001). An introduction to the Kalman filter. New York, NY: ACM, Inc.
- Zhonghua, P., Fangyuan, H., Yuguo, Z., & Dehui, S. (2015). False data injection attacks for output tracking control systems. Proceedings of the 34th Chinese control conference (pp. 6747–6752), Hangzhou, China.