共 65 条
- [1] PrOLoc: Resilient Localization with Private Observers Using Partial Homomorphic Encryption[J]. Alanwar, Amr;Shoukry, Yasser;Chakraborty, Supriyo;Martin, Paul;Tabuada, Paulo;Srivastava, Mani. 2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2017
- [2] Alexandru AB, 2018, IEEE DECIS CONTR P, P5014, DOI 10.1109/CDC.2018.8619835
- [3] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks[J]. Amin, Saurabh;Litrico, Xavier;Sastry, Shankar;Bayen, Alexandre M. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013(05)
- [4] Anderson B. D. O., 1979, Optimal filtering
- [5] [Anonymous], 1978, FDN SEC COMPUT
- [6] Bai CZ, 2014, P AMER CONTR CONF, P3029, DOI 10.1109/ACC.2014.6859155
- [7] Biham E., 2012, Differential Cryptanalysis of the Data Encryption Standard
- [8] Bo S., 2011, International Journal of Networking and Computing, V1, P277
- [9] Nonlinear Control of a Variable-Speed Wind Turbine Using a Two-Mass Model[J]. Boukhezzar, Boubekeur;Siguerdidjane, Houria. IEEE TRANSACTIONS ON ENERGY CONVERSION, 2011(01)
- [10] Event-Triggered State Estimation: Experimental Performance Assessment and Comparative Study[J]. Chen, Wentao;Shi, Dawei;Wang, Junzheng;Shi, Ling. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2017(05)