2016
DOI: 10.14736/kyb-2016-3-0478
|View full text |Cite
|
Sign up to set email alerts
|

Model following control system with time delays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…FDI attacks are designed to exploit the vulnerabilities of network and hardware backdoor so as to compromise CPSs real data by passing the given bad data detection mechanism without being perceived [8,10,18,25]. For example, Liang et al illustrated that attackers could take advantage of the network vulnerability to implement FDI attacks which led to the blackout of smart grid [10].…”
Section: Introductionmentioning
confidence: 99%
“…FDI attacks are designed to exploit the vulnerabilities of network and hardware backdoor so as to compromise CPSs real data by passing the given bad data detection mechanism without being perceived [8,10,18,25]. For example, Liang et al illustrated that attackers could take advantage of the network vulnerability to implement FDI attacks which led to the blackout of smart grid [10].…”
Section: Introductionmentioning
confidence: 99%
“…Much research has been conducted on the time-delay problem in system control processes. Examples include the semi-active control of single-DOF oscillators [1], the tracking control of reference models [2], the stability analysis of systems with time-delay effect [3], and the reduction of time-delay through improved hardware processing [4]. The time-delay of any given system consists of both variable delay and fixed delay.…”
Section: Introductionmentioning
confidence: 99%