2022
DOI: 10.1016/j.automatica.2022.110607
|View full text |Cite
|
Sign up to set email alerts
|

Input-to-state stability of switched linear systems with unstabilizable modes under DoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
29
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 80 publications
(29 citation statements)
references
References 33 publications
0
29
0
Order By: Relevance
“…Furthermore, it will be interesting to develop a mathematical formula calculating a positive lower bound of the dwell‐time between two successive switching instants, which deserves investigation as a future work. Moreover, the results of the current paper can be further investigated under denial‐of‐service attacks 43 …”
Section: Discussionmentioning
confidence: 89%
See 1 more Smart Citation
“…Furthermore, it will be interesting to develop a mathematical formula calculating a positive lower bound of the dwell‐time between two successive switching instants, which deserves investigation as a future work. Moreover, the results of the current paper can be further investigated under denial‐of‐service attacks 43 …”
Section: Discussionmentioning
confidence: 89%
“…Moreover, the results of the current paper can be further investigated under denial-of-service attacks. 43…”
Section: Discussionmentioning
confidence: 99%
“…It is necessary to pay attention to the study on DoS attacks 16 . In Reference 17, an easily solvable condition was proposed for the admissible sampling interval and a less conservative result for the stability of NSS was obtained under sampling control with DoS attacks. In Reference 18, some new results on DoS attack duration/frequency constraints were given to ensure system stability.…”
Section: Introductionmentioning
confidence: 99%
“…So far, two typical attacks launched by attackers at the communication network layer are Denial of Service (DoS) attacks and deception attacks. [5][6][7] Deception attacks refer to the attacker modifying the control input and measurement data, thus resulting in incomplete or unreliable data resources. Generally, deception attacks can be classified into three types: data replay, data modification, and false data injection.…”
Section: Introductionmentioning
confidence: 99%