[1] 游科友,谢立华.网络控制系统的最新研究综述 [J].自动化学报,2013,39(2):101-118. [2] 陈 梁.“震网”病毒敲响自动化系统安全警钟 [J].自动化技术与应用,2010,29(10):138-138. [3] 吕 尧.基于火焰病毒攻击分析对我国信息安全工作的思考 [J].信息安全与技术,2014,5(5):16-19. [4] 陈兴跃.勒索蠕虫病毒事件反思:网络安全能力急需协同 [J].中国信息化,2017(6):8-11. [5] HUO Zhihong,FANG Huajing.Fault-tolerant control research for networked control system under communication constraints [J].Acta Automatica Sinica,2006,2(5):659-666. [6] FENG Jian,WANG Shenquan.Reliable fuzzy control for a class of nonlinear networked control systems with time delay [J].Acta Automatica Sinica,2012,38(7):1091-1099. [7] 李 炜,蒋栋年.基于T-S模糊模型的非线性网络化控制系统的H∞鲁棒容错控制 [J].控制与决策,2010,25(4):598-604. [8] MAO Zehui,JIANG Bin.Fault estimation and accommodation for networked control systems with transfer delay [J].Acta Automatica Sinica,2007,33(7):738-743. [9] 赵 莉.基于离散事件触发的NCS鲁棒容错控制研究 [D].兰州:兰州理工大学,2014. [10] 李亚洁,李 炜.执行器饱和NCS的满意容错与通信的协同设计 [J].华中科技大学学报(自然科学版),2017,45(1):69-75. [11] 王 君,姚晓婉,李 炜.NNCS混合容错控制方法 [J].控制与决策,2018(2):316-329. [12] GUPTA R A,CHOW M Y.Performance assessment and compensation for secure networked control systems [C]//Conference of IEEE Industrial Electronics,2008.[S.l.]:IEEE,2008:2929-2934. [13] ZHANG L,XIE L,LI W,et al.Security solutions for networked control systems based on DES algorithm and improved grey prediction model [J].International Journal of Computer Network & Information Security,2013,6(1):78-85. [14] 袁欢欢.Delta算子网络化控制系统优化与安全问题研究 [D].秦皇岛:燕山大学,2016. [15] DE PERSIS C,TESI P.Input-to-state stabilizing control under denial of service [J].IEEE Transactions on Automatic Control,2015,60(11):2930-2944. [16] FENG Shuai,PIETRO Tesi.Resilient control under denial of service:robust design [C]//American Control Conference.[S.l.]:IEEE,2016:134-139. [17] DOLK V S,TESI P,PERSIS C D,et al.Event-triggered control systems under denial of service attacks [J].IEEE Transactions on Control of Network Systems,2017,4(1):93-105. [18] LI Y,VOOS H,DAROUACH M.Robust H∞ cyber attacks estimation for control systems [C]//Control Conference.[S.l.]:IEEE,2014:3124-3129. [19] LI Y,VOOS H,DAROUACH M,et al.An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach [J].Ima Journal of Mathematical Control & Information,2015,11(1):1-1. [20] YUAN Yuan,YUAN H,GUO L,et al.Resilient control of networked control system under DoS attacks:a unifiedgame approach [J].IEEE Transactions on Industrial Informatics,2016,12(5):1786-1794. [21] YASEEN A A,BAYART M.Cyber-attack detection in the networked control system with faulty plant [C]//Mediterranean Conference on Control and Automation.Valletta,Malta:IEEE,2017:980-985. [22] YASEEN A A,BAYART M.Cyber-attack detection with fault accommodation based on intelligent generalized predictive control [C]//20th World Congress of the International Federational of Automatic Control.Toulouse,France:[s.n.],2017:2601-2608. [23] YASEEN A A,BAYART M.Attack-Tolerant networked control system based on the deception for the cyber-attacks [C]//Industrial Control Systems Security.[S.l.]:IEEE,2016:37-44. [24] CHEN Peng,HAN Q L,YUE D.A discrete event-triggered communication scheme for networked T-S fuzzy systems [C]//Conference on IEEE Industrial Electronics Society.[S.l.]:IEEE,2012:2282-2287. [25] 肖会芹,何 勇,吴 敏,等.基于T-S模糊模型非线性网络控制系统改进H∞跟踪控制 [J].控制理论与应用,2012,29(1):71-78. [26] LIU Kun,FRIDMAN E.Wirtinger’s inequality and Lyapunov-based sampled-data stabilization [J].Automatica,2012,48(1):102-108. [27] 于 明,陈卫东,周希元.源端网络中SYN洪流攻击的自适应检测 [J].武汉大学学报(理学版),2006,52(5):608-612. |