Periodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systems
From MaRDI portal
Publication:6063765
DOI10.1002/rnc.6109zbMath1528.93127OpenAlexW4220690980MaRDI QIDQ6063765
Unnamed Author, Wentao Zhang, Zhiqiang Zuo, Unnamed Author, Yi-Jing Wang
Publication date: 12 December 2023
Published in: International Journal of Robust and Nonlinear Control (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/rnc.6109
Cites Work
- Unnamed Item
- Neutralizing zero dynamics attack on sampled-data systems via generalized holds
- Randomized transmission protocols for protection against jamming attacks in multi-agent consensus
- Resilient synchronization of distributed multi-agent systems under attacks
- A secure control framework for resource-limited adversaries
- Distributed consensus in multi-vehicle cooperative control. Theory and applications.
- Input-to-State Stabilizing Control Under Denial-of-Service
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Necessary and sufficient conditions for solving consensus problems of double-integrator dynamics via sampled control
- Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information
- Competitive Interaction Design of Cooperative Systems Against Attacks
- Randomized Consensus-Based Distributed Kalman Filtering Over Wireless Sensor Networks
- Data rate for output feedback consensus of uncertain nonlinear multiagent systems
- Observer-Based Control for Cyber-Physical Systems With Periodic DoS Attacks via a Cyclic Switching Strategy
- Novel Stealthy Attack and Defense Strategies for Networked Control Systems
- Stealthy Adversaries Against Uncertain Cyber-Physical Systems: Threat of Robust Zero-Dynamics Attack
- Security Control for LPV System With Deception Attacks via Model Predictive Control: A Dynamic Output Feedback Approach
- Event‐based resilience to DoS attacks on communication for consensus of networked Lagrangian systems
This page was built for publication: Periodic zero‐dynamics attacks for discrete‐time second‐order multi‐agent systems