2022
DOI: 10.1109/tvt.2022.3169349
|View full text |Cite
|
Sign up to set email alerts
|

Quantized Sampled-Data Control Tactic for T-S Fuzzy NCS Under Stochastic Cyber-Attacks and Its Application to Truck-Trailer System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 54 publications
(17 citation statements)
references
References 38 publications
0
17
0
Order By: Relevance
“…Lyapunov-Krasovskii functions (LKFs) and the secondorder weight method (SOWM) are used to estimate the error generated by T-S fuzzy networked control systems under DoS attack [41]. Reciprocally convex matrix inequality (RCMI), proper integral inequalities, and the linear convex combination method (LCCM) are used to analyze the T-S fuzzy networked control systems under stochastic cyberattacks (SCAs) [42].…”
Section: B Previous Workmentioning
confidence: 99%
“…Lyapunov-Krasovskii functions (LKFs) and the secondorder weight method (SOWM) are used to estimate the error generated by T-S fuzzy networked control systems under DoS attack [41]. Reciprocally convex matrix inequality (RCMI), proper integral inequalities, and the linear convex combination method (LCCM) are used to analyze the T-S fuzzy networked control systems under stochastic cyberattacks (SCAs) [42].…”
Section: B Previous Workmentioning
confidence: 99%
“…CDR works by following the file format specification and sanitizing/ disarming or removing all attack vectors found in the file [3] and increasing user security. An attack vector, or threat vector, is a way for attackers to enter a network or cause a denial-of-service (DoS) [18], [19]. Common attack vectors include social engineering attacks [20], credential theft [21], vulnerability exploits [22], and insufficient protection against insider threats [23].…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge, quantization as a necessary step in networked control systems (NCSs), has been researched extensively since it involves the output acted on the controlled system and helps to accommodate limited transmission capacity 29 . Just to mention a few, the article 30 introduced quantized sampled‐data control tactic to T‐S fuzzy NCSs with stochastic cyber‐attacks. The problem of finite‐time quantized stabilization for discrete singular jump systems was presented in Reference 31 .…”
Section: Introductionmentioning
confidence: 99%