2020
DOI: 10.1109/tsmc.2019.2952467
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Pricing-Based Resilient Strategy Design for Cloud Control System Under Jamming Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…(2) Xia, Y. also collaborated with authors from cluster 2 (light blue color) in [34], (3) Xia, Y. also collaborated with Yan, C.; Li, Y. from cluster 4 (green color) in [35], [36], (4) Xia, Y. also collaborated with authors in cluster 6 (purple color) in [21], [26], [37], [38]. Lastly, it can be observed that the publication venues (metric M04) were scattered over different venues, as shown in Table 4.…”
Section: Startmentioning
confidence: 99%
See 2 more Smart Citations
“…(2) Xia, Y. also collaborated with authors from cluster 2 (light blue color) in [34], (3) Xia, Y. also collaborated with Yan, C.; Li, Y. from cluster 4 (green color) in [35], [36], (4) Xia, Y. also collaborated with authors in cluster 6 (purple color) in [21], [26], [37], [38]. Lastly, it can be observed that the publication venues (metric M04) were scattered over different venues, as shown in Table 4.…”
Section: Startmentioning
confidence: 99%
“…12, No. 1, March 2023: 135-148 140 [26], [27], [31], [33], [34], [36]- [56]. Then, followed by cloud architecture with 14 articles [12], [19], [20], [23], [24], [57]- [65].…”
Section: Answering Rq2: States Of Current Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, it is assumed that the communication channel between the sensor and the remote estimator is an Additive White Gaussian Noise (AWGN) network using Quadrature Amplitude Modulation (QAM) (similar to [17]). We consider that the malicious attacker is of “jamming” type [21, 22]; that is, the attacker can launch DoS attacks to jam the communication channel between the sensor and the remote estimator to degrade the system performance. According to digital communication theory [23], the relationship between the symbol error rate (SER) and signal to noise ratio (SNR) is: SER=Q(2SNR),where Qfalse(xfalse)=1/2πx+et2/2dt.…”
Section: Problem Formulationmentioning
confidence: 99%
“…There are several models for dynamic pricing (Yeganeh et al, 2019;Yuan et al, 2019). Each of the models focuses on a specific feature of the critical pricing elements.…”
Section: Introductionmentioning
confidence: 99%