References
- Amato, F., & Ariola, M. (2005). Finite-time control of discrete-time linear systems. IEEE Transactions on Automatic Control, 50(5), 724–729. https://doi.org/10.1109/TAC.2005.847042
- Bhat, S. P., & Bernstein, D. S. (2000). Finite-time stability of continuous autonomous systems. SIAM Journal on Control and Optimization, 38(3), 751–766. https://doi.org/10.1137/S0363012997321358
- Cao, R., Wu, J., Long, C., & Li, S. (2015). Stability analysis for networked control systems under denial-of-service attacks. In 2015 54th IEEE Conference on Decision and Control (CDC), Osaka (pp. 7476–7481). IEEE.
- Cetinkaya, A., Ishii, H., & Hayakawa, T. (2015). Event-triggered output feedback control resilient against jamming attacks and random packet losses. IFAC-PapersOnLine, 48(22), 270–275. https://doi.org/10.1016/j.ifacol.2015.10.342
- Cetinkaya, A., Ishii, H., & Hayakawa, T. (2017). Networked control under random and malicious packet losses. IEEE Transactions on Automatic Control, 62(5), 2434–2449. https://doi.org/10.1109/TAC.2016.2612818
- Cetinkaya, A., Ishii, H., & Hayakawa, T. (2018). Analysis of stochastic switched systems with application to networked control under jamming attacks. IEEE Transactions on Automatic Control, 64(5), 2013–2028. https://doi.org/10.1109/TAC.2018.2832466.
- Chen, X., Wang, Y., & Hu, S. (2018). Event-based robust stabilization of uncertain networked control systems under quantization and denial-of-service attacks. Information Sciences, 459, 369–386. https://doi.org/10.1016/j.ins.2018.05.019
- Chen, X., Wang, Y., & Hu, S. (2019). Event-triggered quantized H∞ control for networked control systems in the presence of denial-of-service jamming attack. Nonlinear Analysis: Hybrid Systems, 33, 265–281. https://doi.org/10.1016/j.nahs.2019.03.005.
- Dolk, V. S., Tesi, P., De Persis, C., & Heemels, W. P. M. H. (2015). Output-based event-triggered control systems under denial-of-service attacks. Proceedings of the 54th IEEE Conference on Decision and Control, Osaka, Japan (pp. 4824–4829). IEEE.
- Dorato, P. (1961). Short time stability in linear time-varying systems. Proceedings of IRE International Convention Record, New York (pp. 83–87). IEEE.
- Feng, Z., & Hu, G. Q. (2017a). Distributed secure average consensus for linear multi-agent systems under DoS attacks. Proceedings of American Control Conference, Seattle, USA (pp. 2261–2266). IEEE.
- Feng, Z., & Hu, G. Q. (2017b). Distributed secure leader-following consensus of multi-agent systems under DoS attacks and directed topology. In Proceedings of the IEEE International Conference on Information and Automation (ICIA), Macau, China, July 2017 (pp. 73–79).
- Feng, Z., & Hu, G. Q. (2020). Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Transactions on Control Systems Technology, 28(3), 741–752. https://doi.org/10.1109/TCST.2019.2892032
- Feng, S., & Tesi, P. (2016). Resilient control under Denial-of-Service: Robust design. 2016 American Control Conference, Boston, MA, USA (pp. 4737–4742). IEEE.
- Feng, S., & Tesi, P. (2017a). Networked control systems under denial-of-service: Co-located vs. remote architectures. Systems & Control Letters, 108, 40–47. https://doi.org/10.1016/j.sysconle.2017.08.003
- Feng, S., & Tesi, P. (2017b). Resilient control under denial-of-service: Robust design. Automatica, 79, 42–51. https://doi.org/10.1016/j.automatica.2017.01.031
- Foroush, H. S., & Martinez, S. (2016). On triggering control of single-input linear systems under pulse-width modulated DoS signals. SIAM Journal on Control and Optimization, 54(6), 3084–3105. https://doi.org/10.1137/16M1069390
- Foroush, H. S., & Martínez, S. (2012). On event-triggered control of linear systems under periodic denial-of-service jamming attacks. Proceedings of the IEEE 51st IEEE Conference on Decision and Control, Maui, HI, USA (pp. 2551–2556). IEEE.
- Hu, S., Yue, D., Xie, X., Chen, X., & Yin, X. (2019). Resilient event-triggered controller synthesis of networked control systems under periodic DoS jamming attacks. IEEE Transactions on Cybernetics, 49(12), 4271–4281. https://doi.org/10.1109/TCYB.6221036
- Keller, J. Y., Chabir, K., & Sauter, D. (2016). Input reconstruction for networked control systems subject to deception attacks and data losses on control signals. International Journal of Systems Science, 47(4), 814–820. https://doi.org/10.1080/00207721.2014.906683
- Liu, L., Ma, L., Wang, Y., Zhang, J., & Bo, Y. (2020). Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks. Journal of the Franklin Institute, 357(8), 4983–5003. https://doi.org/10.1016/j.jfranklin.2020.01.029
- Liu, L., Sun, H., Ma, L., Zhang, J., & Bo, Y. (2020). Quasi-consensus control for a class of time-varying stochastic nonlinear time-delay multiagent systems subject to deception attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 1–11. https://doi.org/10.1109/tsmc.2020.2964826
- Liu, J., Yin, T., Shen, M., Xie, X., & Cao, J. (2018). State estimation for cyber-physical systems with limited communication resources, sensor saturation and denial-of-service attacks. ISA Transactions. https://doi.org/10.1016/j.isatra.2018.12.032
- Lu, A., & Yang, G. (2018). Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Transactions on Automatic Control, 63(6), 1813–1820. https://doi.org/10.1109/TAC.9
- Mastellone, S., Abdallah, C. T., & Dorato, P. (2005). Stability and finite-time stability analysis of discrete-time nonlinear networked control systems. Proceedings of the American Control Conference (pp. 1239–1244). IEEE.
- Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA (pp. 911–918). IEEE.
- Pang, Z., & Liu, G. (2012). Design and implementation of secure networked predictive control systems under deception attacks. IEEE Transactions on Control Systems Technology, 20(5), 1334–1342. https://doi.org/10.1109/TCST.2011.2160543
- Persis, C. D., & Tesi, P. (2015). Input-to-state stabilizing control under denial-of-service. IEEE Transactions on Automatic Control, 60(11), 2930–2944. https://doi.org/10.1109/TAC.2015.2416924
- Schenato, L. (2009). To zero or to hold control inputs with lossy links? IEEE Transactions on Automatic Control, 54(5), 1093–1099. https://doi.org/10.1109/TAC.2008.2010999
- Senejohnny, D., De Persis, C., & Tesi, P. (2015). Self-triggered coordination over a shared network under denial-of-service. 54th IEEE Conference on Decision and Control, Osaka, Japan (pp. 3469–3474). IEEE.
- Sun, Y. C., & Yang, G. H. (2018a). Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks. Information Sciences, 465, 340–352. https://doi.org/10.1016/j.ins.2018.07.030
- Sun, Y. C., & Yang, G. H. (2018b). Periodic event-triggered resilient control for cyber-physical systems under denial-of-service attacks. Journal of the Franklin Institute, 355(13), 5613–5631. https://doi.org/10.1016/j.jfranklin.2018.06.009
- Teixeira, A., Sandberg, H., & Johansson, K. (2010). Networked control systems under cyber attacks with applications to power networks. Proceeding of the American Control Conference, Baltimore, MD, USA (pp. 3690–3696). IEEE.
- Wang, Y. L., & Han, Q. L. (2018). Network-based modelling and dynamic output feedback control for unmanned marine vehicles in network environments. Automatica, 91, 43–53. https://doi.org/10.1016/j.automatica.2018.01.026
- Wang, Y. L., Wang, T. B., & Han, Q. L. (2016). Fault detection filter design for data reconstruction-based continuous-time networked control systems. Information Sciences, 328, 577–594. https://doi.org/10.1016/j.ins.2015.08.049
- Wang, D., Wang, Z., Shen, B., Alsaadi, F. E., & Hayat, T. (2016). Recent advances on filtering and control for cyber-physical systems under security and resource constraints. Journal of the Franklin Institute, 353(11), 2451–2466. https://doi.org/10.1016/j.jfranklin.2016.04.011
- Wang, J., Zhang, X. M., Lin, Y., Geb, X., & Han, Q.-L. (2018). Event-triggered dissipative control for networked stochastic systems under non-uniform sampling. Information Sciences, 447, 216–228. https://doi.org/10.1016/j.ins.2018.03.003
- Xiang, Z., Sun, Y.-N., & Mahmoud, M. S. (2012). Robust finite-time H∞ control for a class of uncertain switched neutral systems. Communications in Nonlinear Science and Numerical Simulation, 17(4), 1766–1778. https://doi.org/10.1016/j.cnsns.2011.09.022
- Xu, Y., Fang, M., Wu, Z. G., Pan, Y.-J., Chadli, M., & Huang, T. (2018). Input-based event-triggering consensus of multiagent systems under denial-of-service attacks. IEEE Transactions on Systems, Man, and Cybernetics Systems, 50(4), 1455–1464. https://doi.org/10.1109/TSMC.2018.2875250
- Xu, W., Ho, D. W. C., Zhong, J., & Chen, B. (2019). Event/self-triggered control for leader-following consensus over unreliable network with DoS attacks. IEEE Transactions on Neural Networks and Learning Systems, 30(10), 3137–3149. https://doi.org/10.1109/TNNLS.2018.2890119
- Xu, W., Hu, G., Ho, D. W. C., & Feng, Z. (2019). Distributed secure cooperative control under denial-of-service attacks from multiple adversaries. IEEE Transactions on Cybernetics, 50(8), 3458–3467. https://doi.org/10.1109/TCYB.2019.2896160
- Yuan, Y., Sun, F., & Zhu, Q. (2015). Resilient control in the presence of dos attack: Switched system approach. International Journal of Control, Automation, and Systems, 13(6), 1423–1435. https://doi.org/10.1007/s12555-014-0261-7
- Zhang, X. M., Han, Q. L., & Zhang, B. L. (2017). An overview and deep investigation on sampled-data-based event-triggered control and filtering for networked systems. IEEE Transactions on Industrial Informatics, 13(1), 4–16. https://doi.org/10.1109/TII.2016.2607150
- Zhihui, Z., Dan, L., Chao, D., & Fan, Q.-Y. (2020). A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks. Information Sciences, 519, 260–272. https://doi.org/10.1016/j.ins.2020.01.047
- Zhu, M., & Martinez, S. (2013). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804–808. https://doi.org/10.1109/TAC.2013.2279896