This article focuses on the H-infinity control against mixed denial of service (DoS) attacks for cyber-physical systems (CPSs), where attacks are under zero-input and hold-input strategies. By introducing a unified mo...
详细信息
ISBN:
(纸本)9798350311259
This article focuses on the H-infinity control against mixed denial of service (DoS) attacks for cyber-physical systems (CPSs), where attacks are under zero-input and hold-input strategies. By introducing a unified model describing the simultaneous existence of the two attacks, the CPS can be converted to a switched system with one delay. To ensure control performance, the type-dependent average dwell time (ADT) is applied for the first time to pose constraints on the occurrence frequency of DoS attacks. In the meantime, multiple discontinuous Lyapunov functions (MDLFs) are employed. Upon this, the global uniform exponential stability (GUES) and H-infinity performance of the closedloop system are guaranteed. Finally, the effectiveness of our theoretical results is verified by a numerical example.
Gmapping and Karto are two classic laser-based SLAM algorithms widely used in various applications. This paper evaluated and compared the performances of these two algorithms. A series of experiments were conducted wi...
详细信息
A time-synchronized controller is proposed to solve the time-varying constrained reorientation problem. Time-Synchronized Stability (TSS) that considers the interrelationships among different state errors plays an imp...
详细信息
In order to address the challenge of simultaneously recognizing and calculating the picking points of tomatoes in an unstructured environment, a method of identifying and locating cherry tomato picking points in a gre...
详细信息
The goal of this exploration is to deeply analyze the integrated coordinated control of electrical automationtechnology in the field of renewable energy power generation, with the aim of enhancing the stability and o...
详细信息
This paper highlights the progress toward securing teleoperating devices over the past ten years of active technology development. The relevance of this issue lies in the widespread development of teleoperating system...
详细信息
ISBN:
(纸本)9781665489218
This paper highlights the progress toward securing teleoperating devices over the past ten years of active technology development. The relevance of this issue lies in the widespread development of teleoperating systems with a small number of systems allowed for operations. Anomalous behavior of the operating device, caused by a disruption in the normal functioning of the system modules, can be associated with remote attacks and exploitation of vulnerabilities, which can lead to fatal consequences. There are regulations and mandates from licensing agencies such as the US Food and Drug Administration (FDA) that place restrictions on the architecture and components of teleoperating systems. These requirements are also evolving to meet new cybersecurity threats. In particular, consumers and safety regulatory agencies are attracted by the threat of compromising hardware modules along with software insecurity. Recently, detailed security frameworks and protocols for teleoperating devices have appeared. However, a matter of intelligent autonomous controllers for analyzing anomalous and suspicious actions in the system remain unattended, as well as emergency protocols from the point of cybersecurity view. This work provides a new approach for the intraoperative cybersecurity of intelligent teleoperative surgical systems, taking into account modern requirements for implementing into the Surgical Remote intelligent Robotic System LevshAI. The proposed principal security model allows a surgeon or autonomous agent to manage the operation process during various attacks.
Power grids that integrate cyber-physical systems are vulnerable to a variety of cyberthreats, such as DoS assaults, which can impair system stability and interfere with LFC operations. The proposed study suggests a u...
详细信息
With the rapid development of the Industrial Internet of Things (IIoT), secure and efficient data sharing has become crucial for enabling industrial automation and smart transformation. However, existing centralized s...
详细信息
To mitigate the impact of factors such as fluctuations in photovoltaic output power and load switching on the voltage of the DC bus, and to enhance the anti-interference capability and response speed of the energy rou...
详细信息
With the rise of sophisticated cyber threats, safeguarding industrial controlsystems (ICSs) has become increasingly important. This paper delves into physics-based attack detection techniques within cyber-Physical Sy...
详细信息
暂无评论