2022
DOI: 10.1080/00207721.2022.2053893
|View full text |Cite
|
Sign up to set email alerts
|

Recent advances in event-triggered security control of networked systems: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(14 citation statements)
references
References 94 publications
0
14
0
Order By: Relevance
“…There are a number of existing event triggered communication mechanisms which can be used to handle cyberattacks such as Denial of Service (DoS), False Data Injection (FDI), and Hybrid attacks. These methods may include communication strategies such as hybridtriggered (HTS), adaptive event-triggered (AETS), dynamic event-triggered (DETS), memory-based eventtriggered (METS), switching-like event triggered (SLETS), and stochastic event-triggered (Wu et al, 2022). Table 8 shows the associated cyberattacks and the eventtriggered schemes used for each strategy.…”
Section: Recommendations For the Way Forwardmentioning
confidence: 99%
“…There are a number of existing event triggered communication mechanisms which can be used to handle cyberattacks such as Denial of Service (DoS), False Data Injection (FDI), and Hybrid attacks. These methods may include communication strategies such as hybridtriggered (HTS), adaptive event-triggered (AETS), dynamic event-triggered (DETS), memory-based eventtriggered (METS), switching-like event triggered (SLETS), and stochastic event-triggered (Wu et al, 2022). Table 8 shows the associated cyberattacks and the eventtriggered schemes used for each strategy.…”
Section: Recommendations For the Way Forwardmentioning
confidence: 99%
“…The motivations for the survey are twofold. Firstly, diverse control methods have been developed in the published literature throughout the last decade to explore the defense mechanisms for MASs under network attacks, which are not covered in the existing surveys [ 18 , 19 , 20 , 21 , 22 ]. Secondly, the related fields are mature enough to deserve a survey classifying the existing analytical approaches, the models used and the results achieved for the MASs under attacks from both systems and control perspectives.…”
Section: Introductionmentioning
confidence: 99%
“…In order to facilitate the transmission between signals, network transmission can be adopted. However, when a large amount of data is transmitted, limited communication resources may lead to the emergence of network induced phenomena, such as packet loss, network delay, and network security [26][27][28][29][30]. Among these factors, the packet loss and network delay have been widely studied for synchronous control problem of MJNNs [31,32], while network security is easily ignored.…”
Section: Introductionmentioning
confidence: 99%