共 29 条
[4]
Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost
[J].
2019 AMERICAN CONTROL CONFERENCE (ACC),
2019,
:4063-4068
[5]
Monitoring and Defense of Industrial Cyber-Physical Systems Under Typical Attacks: From a Systems and Control Perspective
[J].
IEEE TRANSACTIONS ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS,
2023, 1
:192-207
[6]
Katz Y., 2020, Introduction to modern cryptography
[7]
Kennedy J., 2024, EARLY ACCESS, DOI [10.1109/TAC.2024.3385315.24, DOI 10.1109/TAC.2024.3385315.24]