共 11 条
- [1] Carvalho LK, 2016, INT WORKS DISCRETE, P298, DOI 10.1109/WODES.2016.7497863
- [2] Frey G., 2002, Design and formal analysis of Petri net based logic control algorithms
- [3] GIUA A, 1992, 1992 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1 AND 2, P974, DOI 10.1109/ICSMC.1992.271666
- [4] Hoehn A, 2016, P AMER CONTR CONF, P302, DOI 10.1109/ACC.2016.7524932
- [5] Security Against Network Attacks in Supervisory Control Systems [J]. IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
- [6] PETRI NETS - PROPERTIES, ANALYSIS AND APPLICATIONS [J]. PROCEEDINGS OF THE IEEE, 1989, 77 (04) : 541 - 580
- [8] Su R, 2017, P AMER CONTR CONF, P3200, DOI 10.23919/ACC.2017.7963440
- [9] A secure control framework for resource-limited adversaries [J]. AUTOMATICA, 2015, 51 : 135 - 148
- [10] Thorsley D, 2006, IEEE DECIS CONTR P, P6049