[1] LIU Y,PENG Y,WANG B,et al.Review on cyber-physical systems [J].IEEE/CAA Journal of Automatica Sinica,2017,4(1):27-40. [2] MAHMOUD M S,HAMDAN M M,BAROUDI U A.Modeling and control of cyber-physical systems subject to cyber-attacks:a survey of recent advances and challenges [J].Neurocomputing,2019,338:101-115. [3] QI W,HOU Y,ZONG G,et al.Finite-time event-triggered control for semi-Markovian switching cyber-physical systems with FDI attacks and applications [J].IEEE Transactions on Circuits and Systems I:Regular Papers,2021,68(6):2665-2674. [4] PAN Y,WU Y,LAM H K.Security-based fuzzy control for nonlinear networked control systems with DoS attacks via a resilient event-triggered scheme [J].IEEE Transactions on Fuzzy Systems,2022,30(10):4359-4368. [5] TEIXEIRA A,PÉREZ D,SANDBERG H,et al.Attack models and scenarios for networked control systems [C]//Proceedings of the 1st International Conference on High Confidence Networked Systems.Beijing,China:[s.n.],2012:55-64. [6] ZHANG D,FENG G,SHI Y,et al.Physical safety and cyber security analysis of multi-agent systems:a survey of recent advances [J].IEEE/CAA Journal of Automatica Sinica,2021,8(2):319-333. [7] 李建瑞,胡松林,岳 东,等.DoS攻击下随机系统的攻击参数依赖型观测器与控制器协同设计 [J].控制理论与应用,2023,40(6):986-994. [8] 卢韦帆,尹秀霞.DoS攻击下网络化控制系统基于观测器的记忆型事件触发预测控制 [J].控制理论与应用,2022,39(7):1335-1344. [9] 张赟宁,韦 乐,付文龙,等.考虑FDI攻击的MTDC系统分布式频率控制 [J].电网技术,2023,47(2):842-848. [10] 祝超群,朱怡蓉.虚假数据注入攻击下信息物理系统动态输出反馈控制 [J].兰州理工大学学报,2023,49(1):74-82. [11] GUO P,KIM H,VIRANI N,et al.Roboads:anomaly detection against sensor and actuator misbehaviors in mobile robots [C]//The 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Luxembourg:[s.n.],2018:574-585. [12] DASH P,LI G,CHEN Z,et al.Pid-piper:recovering robotic vehicles from physical attacks [C]//The 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Taipei:[s.n.],2021:26-38. [13] CHEN Y,FEI S,LI Y.Robust stabilization for uncertain saturated time-delay systems:a distributed-delay-dependent polytopic approach [J].IEEE Transactions on Automatic Control,2016,62(7):3455-3460. [14] FRIDMAN E,PILA A,SHAKED U.Regional stabilization and H∞ control of time-delay systems with saturating actuators [J].International Journal of Robust and Nonlinear Control,2003,13(9):885-907. [15] LIU K,FRIDMAN E.Delay-dependent methods and the first delay interval [J].Systems & Control Letters,2014,64:57-63. [16] CHEN Y,WANG Z.Local stabilization for discrete-time systems with distributed state delay and fast-varying input delay under actuator saturations [J].IEEE Transactions on Automatic Control,2020,66(3):1337-1344. [17] YUAN Y,ZHANG P,GUO L,et al.Towards quantifying the impact of randomly occurred attacks on a class of networked control systems [J].Journal of the Franklin Institute,2017,354(12):4966-4988. [18] ZHU C,JIA X,ZHANG P.Intermittent control for synchronization of discrete-delayed complex cyber-physical networks under mixedattacks [J/OL].[2023-06-10].https://www.hindawi.com/journals/jcse/2022/9799958/. [19] CHEN Y,WANG Z,HU J,et al.Synchronization control for discrete-time-delayed dynamical networks with switching topology under actuator saturations [J].IEEE Transactions on Neural Networks and Learning Systems,2020,32(5):2040-2053. [20] LIU J,SUO W,XIA X,et al.Quantized control for a class of neural networks with adaptive event-triggered scheme and complex cyber-attacks [J].International Journal of Robust and Nonlinear Control,2021,31(10):4705-4728. [21] BIRON Z A,DEY S,PISU P.Real-time detection and estimation of denial of service attack in connected vehicle systems [J].IEEE Transactions on Intelligent Transportation Systems,2018,19(12):3893-3902. [22] JU Z,ZHANG H,TAN Y.Distributed deception attack detection in platoon-based connected vehicle systems [J].IEEE Transactions on Vehicular Technology,2020,69(5):4609-4620. [23] MAHMOUD M S,HAMDAN M M,BAROUDI U A.Secure control of cyber physical systems subject to stochastic distributed DoS and deception attacks [J].International Journal of Systems Science,2020,51(9):1653-1668. |