2022
DOI: 10.1016/j.isatra.2021.04.027
|View full text |Cite
|
Sign up to set email alerts
|

Event-triggering control scheme for discrete time Cyberphysical Systems in the presence of simultaneous hybrid stochastic attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…Applying Schur complement lemma to (16), it is clear that Ω + Π T 2 PΠ 2 < 0. Substituting Ω + Π T 2 PΠ 2 < 0 and (8) into (24), one has…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Applying Schur complement lemma to (16), it is clear that Ω + Π T 2 PΠ 2 < 0. Substituting Ω + Π T 2 PΠ 2 < 0 and (8) into (24), one has…”
Section: Resultsmentioning
confidence: 99%
“…Specifcally, the availability and integrity performance of the modern system information is at serious risk, as testifed by several example incidents. For instance, the Iran nuclear program has been attacked by the Stuxnet virus in 2010, and the Ukrainian power grid has been attacked by the Black-Energy 3 virus in 2015 [16]. Generally speaking, according to the type of physical implementation, cyber-attacks can be broadly classifed into false data injection (FDI) attacks [4,17,18], replay attacks [19,20], and denial of service (DoS) attacks [21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attacks can be roughly divided into denial of service (DoS) attacks 10,11 and deception attacks. 12,13 Different from DoS attacks, which prevent data transmission by maliciously consuming computing or communication resources, deception attacks degrade system performance by tampering with the transmitted data. Fake data injection (FDI) attacks 14 are considered as a typical deception attacks and have been widely studied.…”
Section: Introductionmentioning
confidence: 99%
“…The security control of state‐dependent uncertain systems under hybrid network attacks is studied in Liu et al [28], and in order to reduce the impact of hybrid network attacks, H$$ {H}_{\infty } $$ filters are designed to ensure the stability of the system. In Liu et al [29] and Mmh et al [30], the security control problem under hybrid network attack is studied for linear systems. How to design an effective event trigger mechanism to save network resources under the hybrid network attack is studied in the literature [31, 32].…”
Section: Introductionmentioning
confidence: 99%