共 25 条
[1]
Mustafa A, Modares H., Attack analysis and resilient control design for discrete-time distributed multi-agent systems, IEEE Robotics and Automation Letters, 5, 2, pp. 369-376, (2020)
[2]
Amin M, El-Sousy F F M, Aziz G A A, Gaber K, Mohammed O A., CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review, IEEE Access, 9, pp. 38571-38601, (2021)
[3]
Alguliyev R, Imamverdiyev Y, Sukhostat L., Cyber-physical systems and their security issues, Computers in Industry, 100, pp. 212-223, (2018)
[4]
Dibaji S M, Pirani M, Flamholz D B, Annaswamy A M, Johansson K H, Chakrabortty A., A systems and control perspective of CPS security, Annual Reviews in Control, 47, pp. 394-411, (2019)
[5]
Nozari E, Tallapragada P, Cortes J., Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, Automatica, 81, pp. 221-231, (2017)
[6]
Jafarnia-Jahromi A, Broumandan A, Nielsen J, Lachapelle G., GPS vulnerability to spoofing threats and a review of antispoofing techniques, International Journal of Navigation and Observation, 2012, (2012)
[7]
Deng R L, Xiao G X, Lu R X, Liang H, Vasilakos A V., False data injection on state estimation in power systems-attacks, impacts, and defense: A survey, IEEE Transactions on Industrial Informatics, 13, 2, (2017)
[8]
De Persis C, Tesi P., Input-to-state stabilizing control under denial-of-service, IEEE Transactions on Automatic Control, 60, 11, pp. 2930-2944, (2015)
[9]
Liu Y, Ning P, Reiter M K., False data injection attacks against state estimation in electric power grids, ACM Transactions on Information and System Security, 14, 1, (2011)
[10]
Sun Kai-Qi, Qiu Wei, Li Ke-Jun, Yao Wen-Xuan, Liu Yi-Lu, Cyber attack defense control for fast frequency response system, Proceedings of the CSEE, 41, 16, pp. 5476-5485, (2021)