ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Resilient Consensus Against Epidemic Malicious Attacks
Mapping Intimacies
◽
10.23919/ecc54610.2021.9654845
◽
2021
◽
Author(s):
Yuan Wang
◽
Hideaki Ishii
◽
Francois Bonnet
◽
Xavier Defago
Keyword(s):
Malicious Attacks
Download Full-text
Related Documents
Cited By
References
Power Control of Multi-sensor Remote State Estimation Under Malicious Attacks
2020 39th Chinese Control Conference (CCC)
◽
10.23919/ccc50068.2020.9188510
◽
2020
◽
Author(s):
Guangyan Xu
◽
Qiuying Sun
◽
Hao Liu
Keyword(s):
Power Control
◽
State Estimation
◽
Malicious Attacks
◽
Remote State Estimation
Download Full-text
Design Principles for Secure Wireless Sensor Networks: Key Management Schemes and Malicious Attacks
10.21236/ada533169
◽
2010
◽
Author(s):
Faramarz Fekri
◽
E. Ayday
◽
R. Subramanian
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Key Management
◽
Design Principles
◽
Wireless Sensor
◽
Malicious Attacks
◽
Management Schemes
Download Full-text
Resilient Consensus of Multiagent Systems Under Malicious Attacks: Appointed-Time Observer-Based Approach
IEEE Transactions on Cybernetics
◽
10.1109/tcyb.2021.3058094
◽
2021
◽
pp. 1-13
Author(s):
Jialing Zhou
◽
Yuezu Lv
◽
Guanghui Wen
◽
Xinghuo Yu
Keyword(s):
Multiagent Systems
◽
Malicious Attacks
Download Full-text
Secure Control for Cyber-Physical Systems under Malicious Attacks
IEEE Transactions on Control of Network Systems
◽
10.1109/tcns.2021.3094782
◽
2021
◽
pp. 1-1
Author(s):
Chengwei Wu
◽
Weiran Yao
◽
Wei Pan
◽
Guanghui Sun
◽
Jianxing Liu
◽
...
Keyword(s):
Cyber Physical Systems
◽
Malicious Attacks
◽
Physical Systems
◽
Secure Control
Download Full-text
Assessing the Consequence of Cyber and Physical Malicious Attacks in Complex, Cyber-Physical Systems During Early System Design
2018 IEEE 16th International Conference on Industrial Informatics (INDIN)
◽
10.1109/indin.2018.8471937
◽
2018
◽
Cited By ~ 1
Author(s):
Bryan M. OrHalloran
◽
Nikolaos Papakonstantinou
◽
Douglas L. Van Bossuyt
Keyword(s):
System Design
◽
Cyber Physical Systems
◽
Malicious Attacks
◽
Physical Systems
Download Full-text
Robust Defense Strategy for Gas–Electric Systems Against Malicious Attacks
IEEE Transactions on Power Systems
◽
10.1109/tpwrs.2016.2628877
◽
2017
◽
Vol 32
(4)
◽
pp. 2953-2965
◽
Cited By ~ 42
Author(s):
Cheng Wang
◽
Wei Wei
◽
Jianhui Wang
◽
Feng Liu
◽
Feng Qiu
◽
...
Keyword(s):
Malicious Attacks
◽
Defense Strategy
Download Full-text
Probabilistic Model of Control-Flow Altering Based Malicious Attacks
Hardware and Software: Verification and Testing - Lecture Notes in Computer Science
◽
10.1007/978-3-319-70389-3_22
◽
2017
◽
pp. 249-252
◽
Cited By ~ 1
Author(s):
Sergey Frenkel
Keyword(s):
Probabilistic Model
◽
Control Flow
◽
Malicious Attacks
Download Full-text
Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks
International Journal of Computer Applications
◽
10.5120/7915-9258
◽
2012
◽
Vol 50
(19)
◽
pp. 1-6
◽
Cited By ~ 1
Author(s):
G. Indirani
◽
K. Selvakumar
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Attacks
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Malicious Attacks on Electronic Systems and VLSIs for Security
VLSI Design and Test for Systems Dependability
◽
10.1007/978-4-431-56594-9_10
◽
2018
◽
pp. 395-437
Author(s):
Takeshi Fujino
◽
Daisuke Suzuki
◽
Yohei Hori
◽
Mitsuru Shiozaki
◽
Masaya Yoshikawa
◽
...
Keyword(s):
Electronic Systems
◽
Malicious Attacks
Download Full-text
Physical Malicious Attacks Detection in AF Relaying Systems with Unreliable CSI
GLOBECOM 2017 - 2017 IEEE Global Communications Conference
◽
10.1109/glocom.2017.8254010
◽
2017
◽
Author(s):
Yajun Yin
◽
Tiejun Lv
◽
P. Takis Mathiopoulos
◽
Yueming Lu
Keyword(s):
Malicious Attacks
◽
Relaying Systems
◽
Af Relaying
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close