共 30 条
- [1] Hassan M.U., Rehmani M.H., Chen J., Differential privacy techniques for cyber physical systems: a survey, IEEE Commun. Surv. Tutor., 22, 1, pp. 746-789, (2020)
- [2] Zhou Z., Wang B., Dong M., Ota K., Secure and efficient vehicle-to-grid energy trading in cyber physical systems: integration of blockchain and edge computing, IEEE Trans. Syst. Man Cybern. Syst., 50, 1, pp. 43-57, (2020)
- [3] Gao X., Peng M., Tse C.K., Cascading failure analysis of cyber-physical power systems considering routing strategy, IEEE Trans. Circuits Syst. II, Express Briefs, 70, 1, pp. 136-140, (2023)
- [4] Ge X., Han Q., Wu Q., Zhang X., Resilient and safe platooning control of connected automated vehicles against intermittent denial-of-service attacks, IEEE/CAA J. Autom. Sin., 10, 5, pp. 1234-1251, (2023)
- [5] Ma Y., Li Z., Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks, Inf. Sci., 633, pp. 504-516, (2023)
- [6] Pirayesh H., Zeng H., Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey, IEEE Commun. Surv. Tutor., 24, 2, pp. 767-809, (2022)
- [7] Nourian A., Madnick S., A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet, IEEE Trans. Dependable Secure Comput., 15, 1, pp. 2-13, (2018)
- [8] Nemati A., Peimani M., Mobayen S., Sayyedfattahi S., Adaptive non-singular finite time control of nonlinear disturbed cyber-physical systems with actuator cyber-attacks and time-varying delays, Inf. Sci., 612, pp. 1111-1126, (2022)
- [9] Song H., Ding D., Dong H., Yi X., Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks, Automatica, 135, (2022)
- [10] Zhao Y., Du X., Zhou C., Tian Y., Anti-saturation resilient control of cyber-physical systems under actuator attacks, Inf. Sci., 608, pp. 1245-1260, (2022)