检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Hong-Tao Sun Chen Peng Peng Zhou Zhi-Wen Wang
机构地区:[1]Department of Automation, School of MechatronicEngineering and Automation, Shanghai University,Shanghai 200240, People's Republic of China [2]College of Electrical and Information Engineering, LanzhouUniversity of Technology, Lanzhou 730050, Gansu, People'sRepublic of China
出 处:《Advances in Manufacturing》2017年第3期243-250,共8页先进制造进展(英文版)
基 金:This work was supported in part by the National Natural Science Foundation of China (Grant Nos. 61673255, 61263003 and 61273114); the International Corporation Project of Shanghai Science and Technology Commission (Grant No. 14510722500); the Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning; the Key Project of Science and Technology Commission of Shanghai Municipality (Grant No. 10JC1405000); A Project of Shandong Province Higher Educational Science and Technology Program (Grant No. J17KA084).
摘 要:This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.This paper focuses on the issues of the security of networked control systems by summarizing recent progress in secure control of this research and application area. We mainly discuss existing results, especially in modeling issues, of three aspects: (1) attack mechanisms and their impacts on control systems, (2) the identification and design of attacks, and (3) secure estimation and control strategies. A conclusion is drawn at the end of this paper. In addition, several promising research tendencies of the development for secure control in networked control system are presented.
关 键 词:Networked control system SECURITY Attack·Estimation and control
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.31