共 16 条
[1]
Agarwal GK, 2018, IEEE DECIS CONTR P, P1476, DOI 10.1109/CDC.2018.8619457
[2]
Alpcan T., 2010, NETWORK SECURITY, DOI DOI 10.1017/CBO97805117607782-S2.0-84924666047
[3]
Banik S., 2020, SECURE ROUTE PLANNIN
[4]
Hespanha J. P., 2017, Noncooperative game theory: An introduction for engineers and computer scientists
[5]
Output-feedback Linear Quadratic Robust Control under Actuation and Deception Attacks
[J].
2019 AMERICAN CONTROL CONFERENCE (ACC),
2019,
:489-496
[6]
Javaid AY, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, P585, DOI 10.1109/THS.2012.6459914
[7]
Krause A., 2011, Proceedings ofthe 22nd International Joint Conference on Artificial Intelligence (IJCAI), P2133
[8]
Lee C, 2015, 2015 EUROPEAN CONTROL CONFERENCE (ECC), P1872, DOI 10.1109/ECC.2015.7330811
[10]
Mansfield K, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), P722, DOI 10.1109/THS.2013.6699093