{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T06:32:19Z","timestamp":1724135539872},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1016\/j.ins.2018.04.082","type":"journal-article","created":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T00:40:18Z","timestamp":1525221618000},"page":"312-327","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":58,"special_numbering":"C","title":["Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework"],"prefix":"10.1016","volume":"454-455","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7310-1086","authenticated-orcid":false,"given":"Huanhuan","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yuanqing","family":"Xia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ins.2018.04.082_bib0001","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/s11768-018-8002-8","article-title":"Secure design for cloud control system against distributed denial of service attack","volume":"16","author":"Ali","year":"2018","journal-title":"Control Theory Technol."},{"key":"10.1016\/j.ins.2018.04.082_bib0002","series-title":"H\u221e Optimal Control and Related Minimax Design Problems: A Dynamic Game Approach","author":"Ba\u015far","year":"2008"},{"key":"10.1016\/j.ins.2018.04.082_bib0003","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.automatica.2016.12.020","article-title":"A multi-channel transmission schedule for remote state estimation under dos attacks","volume":"78","author":"Ding","year":"2017","journal-title":"Automatica"},{"issue":"15","key":"10.1016\/j.ins.2018.04.082_bib0004","doi-asserted-by":"crossref","first-page":"1808","DOI":"10.1049\/iet-cta.2016.0135","article-title":"Event-based security control for discrete-time stochastic systems","volume":"10","author":"Ding","year":"2016","journal-title":"IET Control Theory Appl."},{"key":"10.1016\/j.ins.2018.04.082_bib0005","doi-asserted-by":"crossref","DOI":"10.1109\/MDAT.2017.2709310","article-title":"Security and privacy in cyber-physical systems: asurvey of surveys","author":"Giraldo","year":"2017","journal-title":"IEEE Des. Test"},{"key":"10.1016\/j.ins.2018.04.082_bib0006","series-title":"Wireless Communications","author":"Goldsmith","year":"2005"},{"issue":"1","key":"10.1016\/j.ins.2018.04.082_bib0007","first-page":"48","article-title":"Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks","volume":"4","author":"Guan","year":"2018","journal-title":"IEEE Trans. Signal Inf. Proces. Netw."},{"issue":"1","key":"10.1016\/j.ins.2018.04.082_bib0008","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TWC.2016.2621040","article-title":"Artificial-noise-aided secure transmission scheme with limited training and feedback overhead","volume":"16","author":"Hu","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.ins.2018.04.082_bib0009","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1016\/j.ins.2016.09.041","article-title":"Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data","volume":"379","author":"Huda","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2018.04.082_bib0010","article-title":"SINR-based dos attack on remote state estimation: agame-theoretic approach","author":"Li","year":"2016","journal-title":"IEEE Trans. Control Netw. Syst."},{"key":"10.1016\/j.ins.2018.04.082_bib0011","article-title":"Detection against linear deception attacks on multi-sensor remote state estimation","author":"Li","year":"2017","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"10","key":"10.1016\/j.ins.2018.04.082_bib0012","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TAC.2015.2461851","article-title":"Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach","volume":"60","author":"Li","year":"2015","journal-title":"IEEE Trans. Autom. Control,"},{"key":"10.1016\/j.ins.2018.04.082_bib0013","first-page":"157","article-title":"Markov games as a framework for multi-agent reinforcement learning","volume":"157","author":"Littman","year":"1994","journal-title":"Proc. Eleventh Int. Conf. Mach. Learn."},{"issue":"2","key":"10.1016\/j.ins.2018.04.082_bib0014","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1016\/j.jfranklin.2016.10.028","article-title":"Stochastic stability of a modified unscented kalman filter with stochastic nonlinearities and multiple fading measurements","volume":"354","author":"Li","year":"2017","journal-title":"J. Franklin Inst."},{"key":"10.1016\/j.ins.2018.04.082_bib0015","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.ins.2017.08.057","article-title":"Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks","volume":"420","author":"Lu","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2018.04.082_bib0016","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.ins.2017.07.029","article-title":"Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer","volume":"417","author":"Lu","year":"2017","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.ins.2018.04.082_bib0017","doi-asserted-by":"crossref","first-page":"4301","DOI":"10.1109\/TPWRS.2013.2277131","article-title":"Decentrilized sliding mode load frequency control for multi-area power control system","volume":"28","author":"Mi","year":"2013","journal-title":"IEEE Trans. Power Syst."},{"issue":"4","key":"10.1016\/j.ins.2018.04.082_bib0018","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"Mo","year":"2014","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"10.1016\/j.ins.2018.04.082_bib0019","series-title":"Proc. European Control Conf.","first-page":"252","article-title":"LQG control with Markovian packet loss","author":"Mo","year":"2013"},{"key":"10.1016\/j.ins.2018.04.082_bib0020","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.automatica.2015.06.019","article-title":"Minimax control over unreliable communication channels","volume":"59","author":"Moon","year":"2015","journal-title":"Automatica"},{"issue":"5","key":"10.1016\/j.ins.2018.04.082_bib0021","doi-asserted-by":"crossref","first-page":"3242","DOI":"10.1109\/TIE.2016.2535119","article-title":"Two-channel false data injection attacks against output tracking control of networked control systems","volume":"63","author":"Pang","year":"2016","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"10","key":"10.1016\/j.ins.2018.04.082_bib0022","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1073\/pnas.39.10.1953","article-title":"Stochastic games","volume":"39","author":"Shapley","year":"1953","journal-title":"Proc. Natl. Acad. Sci. USA"},{"issue":"398","key":"10.1016\/j.ins.2018.04.082_bib0023","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.ins.2017.02.048","article-title":"State estimators for systems with random parameter matrices, stochastic nonlinearities, fading measurements and correlated noises","volume":"397","author":"Sun","year":"2017","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2018.04.082_bib0024","article-title":"Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks","author":"Wang","year":"2016","journal-title":"Int. J. Robust Nonlinear Control"},{"issue":"4","key":"10.1016\/j.ins.2018.04.082_bib0025","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1109\/JSAC.2011.110418","article-title":"An anti-jamming stochastic game for cognitive radio networks","volume":"29","author":"Wang","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"443","key":"10.1016\/j.ins.2018.04.082_bib0026","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1016\/j.ins.2018.02.039","article-title":"Transmission power scheduling and control co-design for wireless sensor networks","volume":"442","author":"Wen","year":"2018","journal-title":"Inf. Sci."},{"issue":"7","key":"10.1016\/j.ins.2018.04.082_bib0027","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-016-5586-9","article-title":"Further results on cloud control systems","volume":"59","author":"Xia","year":"2016","journal-title":"Sci. China Inf. Sci."},{"issue":"371","key":"10.1016\/j.ins.2018.04.082_bib0028","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1016\/j.ins.2016.02.019","article-title":"Distributed formation control for teleoperating cyber-physical system under time delay and actuator saturation constrains","volume":"370","author":"Yan","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2018.04.082_bib0029","series-title":"Analysis and Synthesis of Delta Operator Systems","author":"Yang","year":"2012"},{"issue":"4","key":"10.1016\/j.ins.2018.04.082_bib0030","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1016\/j.jfranklin.2016.12.003","article-title":"Composite control of linear quadratic games in delta domain with disturbance observers","volume":"354","author":"Yuan","year":"2017","journal-title":"J. Franklin Inst."},{"issue":"9","key":"10.1016\/j.ins.2018.04.082_bib0031","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1080\/00207721.2014.973467","article-title":"Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach","volume":"47","author":"Yuan","year":"2016","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.ins.2018.04.082_bib0032","doi-asserted-by":"crossref","first-page":"2842","DOI":"10.1002\/rnc.3714","article-title":"Multi-tasking optimal control of networked control systems: a delta operator approach","volume":"27","author":"Yuan","year":"2017","journal-title":"Int. J. Robust Nonlinear Control"},{"issue":"5","key":"10.1016\/j.ins.2018.04.082_bib0033","doi-asserted-by":"crossref","first-page":"1786","DOI":"10.1109\/TII.2016.2542208","article-title":"Resilient control of networked control system under dos attacks: a unified game approach","volume":"12","author":"Yuan","year":"2016","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"9","key":"10.1016\/j.ins.2018.04.082_bib0034","doi-asserted-by":"crossref","first-page":"1325","DOI":"10.1049\/iet-cta.2016.1279","article-title":"Optimal control for networked control systems with disturbances: a delta operator approach","volume":"11","author":"Yuan","year":"2017","journal-title":"IET Control Theory Appl."},{"key":"10.1016\/j.ins.2018.04.082_bib0035","doi-asserted-by":"crossref","DOI":"10.1109\/TSMC.2017.2704278","article-title":"Event-triggered strategy design for discrete-time nonlinear quadratic games with disturbance compensations: the noncooperative case","author":"Yuan","year":"2017","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"12","key":"10.1016\/j.ins.2018.04.082_bib0036","doi-asserted-by":"crossref","first-page":"4966","DOI":"10.1016\/j.jfranklin.2017.05.016","article-title":"Towards quantifying the impact of randomly occurred attacks on a class of networked control systems","volume":"354","author":"Yuan","year":"2017","journal-title":"J. Franklin Inst."},{"key":"10.1016\/j.ins.2018.04.082_bib0037","doi-asserted-by":"crossref","DOI":"10.1109\/TIE.2017.2711538","article-title":"Active disturbance rejection control for the ranger neutral buoyancy vehicle: a delta operator approach","author":"Yuan","year":"2017","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"3","key":"10.1016\/j.ins.2018.04.082_bib0038","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TCST.2015.2462741","article-title":"Optimal dos attack scheduling in wireless networked control system","volume":"24","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"10.1016\/j.ins.2018.04.082_bib0039","article-title":"Dos attack energy management against remote state estimation","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Control Netw. Syst."},{"issue":"1","key":"10.1016\/j.ins.2018.04.082_bib0040","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/JSYST.2015.2460747","article-title":"Health-CPS: healthcare cyber-physical system assisted by cloud and big data","volume":"11","author":"Zhang","year":"2017","journal-title":"IEEE Syst. J."},{"issue":"2","key":"10.1016\/j.ins.2018.04.082_bib0041","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MNET.2016.7437026","article-title":"Privacy and performance trade-off in cyber-physical systems","volume":"30","author":"Zhang","year":"2016","journal-title":"IEEE Netw."},{"issue":"5","key":"10.1016\/j.ins.2018.04.082_bib0042","doi-asserted-by":"crossref","first-page":"3723","DOI":"10.1109\/TVT.2015.2432120","article-title":"Energy efficiency and contact opportunities tradeoff in opportunistic mobile networks","volume":"65","author":"Zhou","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10.1016\/j.ins.2018.04.082_bib0043","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCS.2014.2364710","article-title":"Game-theoretic methods for robustness, security and resilience of cyber-physical control systems: game-in-game principle for optimal cross-layer resilient control systems","volume":"35","author":"Zhu","year":"2015","journal-title":"IEEE Control Syst. Mag."},{"key":"10.1016\/j.ins.2018.04.082_bib0044","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.neucom.2016.03.104","article-title":"A game-theoretic power control mechanism based on hidden markov model in cognitive wireless sensor network with imperfect information","volume":"220","author":"Zhu","year":"2017","journal-title":"Neurocomputing"},{"issue":"3","key":"10.1016\/j.ins.2018.04.082_bib0045","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/TAC.2013.2279896","article-title":"On the performance analysis of resilient networked control systems under replay attacks","volume":"59","author":"Zhu","year":"2014","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025518303529?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025518303529?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,8,22]],"date-time":"2018-08-22T02:28:09Z","timestamp":1534904889000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025518303529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":45,"alternative-id":["S0020025518303529"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2018.04.082","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2018,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Resilient strategy design for cyber-physical system under DoS attack over a multi-channel framework","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2018.04.082","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}