2020
DOI: 10.1016/j.isatra.2019.02.036
|View full text |Cite
|
Sign up to set email alerts
|

Event-triggered filter design for nonlinear cyber–physical systems subject to deception attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 85 publications
(37 citation statements)
references
References 28 publications
0
37
0
Order By: Relevance
“…Recently, owing to the openness of communication channel, cyber-attacks have become the major threat to network security [42]- [44]. Filtering problems considering the impact of different cyberattacks have thus drawn increasing attention [45]- [47]. However, to the authors' knowledge, no results are available in the literature on the hybrid and adaptive ETCM-based filtering for nonlinear Makov jump systems with cyber-attacks, which is the motivation of this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, owing to the openness of communication channel, cyber-attacks have become the major threat to network security [42]- [44]. Filtering problems considering the impact of different cyberattacks have thus drawn increasing attention [45]- [47]. However, to the authors' knowledge, no results are available in the literature on the hybrid and adaptive ETCM-based filtering for nonlinear Makov jump systems with cyber-attacks, which is the motivation of this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Since the advantage of saving limited communication resources, event-triggered scheme (ETS) become an effective manner to reduce communication cost without losing much system performance [12][13][14][15][16]. By using event-triggered scheme, many outcomes of MJSs about robust control [17], quantized control [18] and finite-time control [19] have been reported.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attacks are classified into three types: repeated attack, denial of service attack, and deception attack, in which the biggest threat to network security is deception attacks. Some interesting results associated with deception attacks have been given [31][32][33][34]. For instance, a secure filter is devised for the delayed stochastic nonlinear systems with a novel multiple-channel attack model [33].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, a secure filter is devised for the delayed stochastic nonlinear systems with a novel multiple-channel attack model [33]. For a nonlinear physical system subject to data injection attacks, an elastic filter is designed by employing a new ETM in reference [34]. e goal of [35] is to devise a filter which can guarantee the system security in the presence of stochastic sensor saturation and stochastic deception attacks.…”
Section: Introductionmentioning
confidence: 99%