Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack
The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter...
Saved in:
Published in | IEEE transactions on cybernetics Vol. 51; no. 8; pp. 4000 - 4010 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.08.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples. |
---|---|
AbstractList | The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples. The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples.The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of-service (DoS) attack, is established for filter design. Second, an adaptive event-triggered scheme is applied to the filter design to save the limited communication resource. In addition, a novel adaptive-event-triggered filtering error model is established with the consideration of hybrid cyber attack and input constraint. Moreover, based on the Lyapunov stability theory and linear matrix inequality technique, sufficient conditions are obtained to guarantee the augmented system stability, and the parameters of the designed filter are presented with explicit forms. Finally, the proposed method is validated by simulation examples. |
Author | Cao, Jinde Liu, Jinliang Wang, Yuda Yue, Dong Xie, Xiangpeng |
Author_xml | – sequence: 1 givenname: Jinliang orcidid: 0000-0001-5489-0246 surname: Liu fullname: Liu, Jinliang email: liujinliang@vip.163.com organization: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China – sequence: 2 givenname: Yuda orcidid: 0000-0002-7821-440X surname: Wang fullname: Wang, Yuda email: wangyd1996@163.com organization: College of Information Engineering, Nanjing University of Finance and Economics, Nanjing, China – sequence: 3 givenname: Jinde orcidid: 0000-0003-3133-7119 surname: Cao fullname: Cao, Jinde email: jdcao@seu.edu.cn organization: School of Mathematics, Southeast University, Nanjing, China – sequence: 4 givenname: Dong orcidid: 0000-0001-7810-9338 surname: Yue fullname: Yue, Dong email: medongy@vip.163.com organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China – sequence: 5 givenname: Xiangpeng orcidid: 0000-0003-4822-3134 surname: Xie fullname: Xie, Xiangpeng email: xiexiangpeng1953@163.com organization: Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China |
BookMark | eNp9kU9r3DAQxUVJadI0H6D0IuglF2-l0eqPj1s3aQKBHrqlhByELI-3Sh15K8mB_fbxsiGHHDqXeQy_N8zw3pOjOEYk5CNnC85Z_WXd3H5dAAO2EIwJLeENOQGuTAWg5dGLVvqYnOV8z-Yy86g278ixAGOUAn5C7n6inxLSVee2JTxidfGIsVTrFDYbTNjRyzAUTPQb5rCJ9Hcof-h13E6FNmPMJbkQC3Wxo1e7NoWONrt2plelOP_3A3nbuyHj2XM_Jb8uL9bNVXXz4_t1s7qpvABVKg2i5R564bQDD6h7zpyQHbaK9cqzlnnFOyVq7IwS0suOGy8Mw1ko6XtxSs4Pe7dp_DdhLvYhZI_D4CKOU7awXLKlBg31jH5-hd6PU4rzdRak1LU2kpuZ0gfKpzHnhL31obgSxrh_eLCc2X0Edh-B3UdgnyOYnfyVc5vCg0u7_3o-HTwBEV_4mosajBBPRe6Qng |
CODEN | ITCEB8 |
CitedBy_id | crossref_primary_10_1016_j_ejcon_2025_101186 crossref_primary_10_1016_j_engappai_2023_106128 crossref_primary_10_1016_j_ins_2023_119527 crossref_primary_10_1002_acs_3529 crossref_primary_10_1002_rnc_5899 crossref_primary_10_1016_j_nahs_2023_101377 crossref_primary_10_1016_j_jfranklin_2021_09_010 crossref_primary_10_1080_0954898X_2024_2392786 crossref_primary_10_1109_TCYB_2024_3367851 crossref_primary_10_1007_s40815_023_01669_w crossref_primary_10_1002_acs_3241 crossref_primary_10_1002_acs_3483 crossref_primary_10_1080_00207721_2024_2365433 crossref_primary_10_1109_TNSE_2021_3107935 crossref_primary_10_1109_JAS_2021_1004162 crossref_primary_10_1109_TCYB_2023_3285526 crossref_primary_10_1109_TCYB_2024_3414650 crossref_primary_10_1016_j_jfranklin_2022_12_025 crossref_primary_10_1016_j_jfranklin_2024_107365 crossref_primary_10_1049_cth2_12059 crossref_primary_10_1016_j_jfranklin_2022_09_016 crossref_primary_10_1016_j_jfranklin_2021_12_020 crossref_primary_10_1109_TCYB_2024_3376695 crossref_primary_10_1109_TSMC_2024_3418970 crossref_primary_10_1016_j_amc_2022_127300 crossref_primary_10_1109_TCYB_2021_3088711 crossref_primary_10_1002_acs_3496 crossref_primary_10_1109_TSMC_2024_3378773 crossref_primary_10_1016_j_dsp_2024_104398 crossref_primary_10_1109_TII_2024_3423454 crossref_primary_10_1109_TSMC_2024_3408413 crossref_primary_10_1007_s00034_024_02678_2 crossref_primary_10_1109_TCYB_2025_3532547 crossref_primary_10_3390_math12020203 crossref_primary_10_1049_cth2_12446 crossref_primary_10_1080_00207721_2022_2093418 crossref_primary_10_1002_rnc_7794 crossref_primary_10_1016_j_jfranklin_2024_106941 crossref_primary_10_1109_TSIPN_2024_3356789 crossref_primary_10_1002_rnc_5957 crossref_primary_10_1016_j_neucom_2022_05_096 crossref_primary_10_1002_oca_3078 crossref_primary_10_1002_rnc_7616 crossref_primary_10_1007_s11071_025_11024_3 crossref_primary_10_1016_j_amc_2024_128723 crossref_primary_10_1109_OJIES_2022_3176683 crossref_primary_10_1109_TNET_2021_3135963 crossref_primary_10_3389_fmars_2024_1320361 crossref_primary_10_1109_TSMC_2023_3339199 crossref_primary_10_1109_TII_2022_3198699 crossref_primary_10_1155_2020_5093620 crossref_primary_10_1109_TCYB_2023_3312346 crossref_primary_10_1109_TNNLS_2021_3137426 crossref_primary_10_1109_TSG_2021_3118801 crossref_primary_10_1109_TFUZZ_2022_3215529 crossref_primary_10_1109_TICPS_2024_3446769 crossref_primary_10_1002_rnc_7103 crossref_primary_10_1002_rnc_7343 crossref_primary_10_1109_TNNLS_2023_3300270 crossref_primary_10_1016_j_ins_2022_08_085 crossref_primary_10_1007_s00034_025_03061_5 crossref_primary_10_1002_acs_3834 crossref_primary_10_3390_s24134071 crossref_primary_10_1016_j_sigpro_2024_109724 crossref_primary_10_1109_TCYB_2024_3496794 crossref_primary_10_1016_j_chaos_2024_115170 crossref_primary_10_1109_TCYB_2022_3151880 crossref_primary_10_1177_01423312241279903 crossref_primary_10_1109_TCSI_2021_3097824 crossref_primary_10_1002_acs_3707 crossref_primary_10_1007_s12555_022_0630_6 crossref_primary_10_1109_TFUZZ_2021_3092200 crossref_primary_10_1002_acs_3689 crossref_primary_10_1002_rnc_7913 crossref_primary_10_1007_s12555_021_1053_5 crossref_primary_10_1109_TASE_2024_3360718 crossref_primary_10_1109_TNSE_2021_3098258 crossref_primary_10_1016_j_ins_2021_01_030 crossref_primary_10_1109_TCSII_2021_3079354 crossref_primary_10_1109_TCYB_2021_3110402 crossref_primary_10_1080_00207721_2024_2345196 crossref_primary_10_1007_s11071_024_09638_0 crossref_primary_10_1177_01423312221148220 crossref_primary_10_1016_j_isatra_2023_04_018 crossref_primary_10_1016_j_ins_2024_121257 crossref_primary_10_1049_cth2_12530 crossref_primary_10_1016_j_jfranklin_2022_05_038 crossref_primary_10_1002_rnc_6950 crossref_primary_10_1002_rnc_7246 crossref_primary_10_1002_rnc_7400 crossref_primary_10_1177_01423312231166455 crossref_primary_10_1109_TSMC_2022_3144161 crossref_primary_10_1007_s40815_022_01346_4 crossref_primary_10_1109_JAS_2022_105548 crossref_primary_10_1109_TCYB_2024_3411868 crossref_primary_10_1109_TCSII_2024_3352667 crossref_primary_10_1109_TASE_2023_3300917 crossref_primary_10_1007_s11768_023_00182_7 crossref_primary_10_1002_acs_3455 crossref_primary_10_1002_mma_10068 crossref_primary_10_1016_j_cnsns_2024_108579 crossref_primary_10_1088_1402_4896_ad6485 crossref_primary_10_1016_j_cnsns_2025_108624 crossref_primary_10_1109_TNSE_2024_3409900 crossref_primary_10_1109_TII_2023_3335996 crossref_primary_10_1109_TCNS_2023_3295345 crossref_primary_10_1016_j_ijepes_2023_109278 crossref_primary_10_1109_TCYB_2021_3125851 crossref_primary_10_1109_TSMC_2022_3143903 crossref_primary_10_1002_acs_3625 crossref_primary_10_3390_electronics10222736 crossref_primary_10_1080_00207721_2022_2083260 crossref_primary_10_1109_TCYB_2023_3241179 crossref_primary_10_1002_asjc_3472 crossref_primary_10_1007_s40815_023_01563_5 crossref_primary_10_1016_j_adhoc_2023_103351 crossref_primary_10_1177_01423312241301299 crossref_primary_10_1016_j_cnsns_2024_108423 crossref_primary_10_1109_TCYB_2023_3311609 crossref_primary_10_1109_TICPS_2024_3481375 crossref_primary_10_1109_TFUZZ_2022_3148875 crossref_primary_10_1109_TSG_2024_3429231 crossref_primary_10_1109_TSMC_2024_3411885 crossref_primary_10_1109_TFUZZ_2023_3306074 crossref_primary_10_1002_rnc_6335 crossref_primary_10_1016_j_amc_2024_128636 crossref_primary_10_1109_ACCESS_2024_3455329 crossref_primary_10_1002_ett_4674 crossref_primary_10_1007_s12555_022_0242_1 crossref_primary_10_1109_TFUZZ_2023_3319662 crossref_primary_10_1177_09596518231199211 crossref_primary_10_1080_00207721_2022_2053893 crossref_primary_10_1140_epjs_s11734_024_01372_3 crossref_primary_10_1109_ACCESS_2020_3046522 crossref_primary_10_1109_TCYB_2021_3052732 crossref_primary_10_1007_s11063_022_10860_3 crossref_primary_10_1080_00207721_2021_1998721 crossref_primary_10_1109_TNSE_2021_3077766 |
Cites_doi | 10.1109/TAC.2015.2416924 10.1109/TFUZZ.2019.2895560 10.1109/TCYB.2019.2944761 10.1002/rnc.4837 10.1109/TFUZZ.2015.2501412 10.1109/TCST.2016.2557224 10.1109/ALLERTON.2009.5394956 10.1109/TCYB.2019.2937951 10.1016/j.ins.2018.12.091 10.1109/TSMC.2016.2616544 10.1109/TCYB.2018.2802044 10.1109/TIE.2017.2726965 10.1109/TSMC.2018.2888633 10.1109/TFUZZ.2018.2883374 10.1016/j.jfranklin.2018.04.001 10.1109/TIE.2018.2885726 10.1109/TSMC.2018.2875484 10.1109/TAC.2013.2279896 10.1109/TNNLS.2016.2538779 10.1109/TSMC.2019.2912846 10.1109/TFUZZ.2018.2849702 10.1109/TSMC.2018.2834967 10.1109/JSEN.2017.2654325 10.1016/j.automatica.2013.01.038 10.1016/j.ins.2017.09.005 10.1016/j.nahs.2019.03.005 10.1109/TCYB.2016.2608499 10.1109/TCYB.2018.2823362 10.1016/j.automatica.2019.06.019 10.1109/TNNLS.2016.2580609 10.1016/j.automatica.2014.10.067 10.1049/iet-cta.2017.0868 10.1109/TFUZZ.2007.905915 10.1109/TCYB.2015.2507177 10.1109/TCYB.2018.2828503 10.1109/TCYB.2020.2972384 10.1109/TSMC.2019.2960115 10.1109/TCYB.2018.2864776 10.1016/j.ins.2017.09.042 10.1109/TAC.2012.2206694 10.1109/TAC.2015.2461851 10.1109/TCYB.2018.2839912 10.1109/TSG.2015.2513772 10.1109/TSMC.2019.2896249 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD F28 FR3 H8D JQ2 L7M L~C L~D 7X8 |
DOI | 10.1109/TCYB.2020.3003752 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Aerospace Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional MEDLINE - Academic |
DatabaseTitle | CrossRef Aerospace Database Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic Aerospace Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EISSN | 2168-2275 |
EndPage | 4010 |
ExternalDocumentID | 10_1109_TCYB_2020_3003752 9139283 |
Genre | orig-research |
GrantInformation_xml | – fundername: Qing Lan Project – fundername: Natural Science Foundation of Jiangsu Province of China grantid: BK20171481 funderid: 10.13039/501100004608 – fundername: National Natural Science Foundation of China grantid: 61973152; 61903182 funderid: 10.13039/501100001809 – fundername: Natural Science Foundation of the Jiangsu Higher Education Institutions of China grantid: 19KJA510005 funderid: 10.13039/501100010023 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7TB 8FD F28 FR3 H8D JQ2 L7M L~C L~D 7X8 |
ID | FETCH-LOGICAL-c326t-723b1c2f3a7a2c2e7f10a35deb60f6c0b0c61d639ed8635c5d18c380e5d165cf3 |
IEDL.DBID | RIE |
ISSN | 2168-2267 2168-2275 |
IngestDate | Fri Jul 11 10:04:52 EDT 2025 Mon Jun 30 05:24:57 EDT 2025 Thu Apr 24 23:12:04 EDT 2025 Tue Jul 01 00:53:56 EDT 2025 Wed Aug 27 02:39:34 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c326t-723b1c2f3a7a2c2e7f10a35deb60f6c0b0c61d639ed8635c5d18c380e5d165cf3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-7821-440X 0000-0003-4822-3134 0000-0001-5489-0246 0000-0001-7810-9338 0000-0003-3133-7119 |
PMID | 32886621 |
PQID | 2557978518 |
PQPubID | 85422 |
PageCount | 11 |
ParticipantIDs | ieee_primary_9139283 crossref_citationtrail_10_1109_TCYB_2020_3003752 crossref_primary_10_1109_TCYB_2020_3003752 proquest_journals_2557978518 proquest_miscellaneous_2440472729 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-08-01 |
PublicationDateYYYYMMDD | 2021-08-01 |
PublicationDate_xml | – month: 08 year: 2021 text: 2021-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on cybernetics |
PublicationTitleAbbrev | TCYB |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref12 ref37 ref15 ref36 ref14 lin (ref44) 2008; 16 ref31 ref30 ref33 ref11 ref32 ref10 ref1 ref39 ref17 ref38 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref42 ref41 ref22 ref21 ref43 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 liu (ref2) 2020 |
References_xml | – ident: ref43 doi: 10.1109/TAC.2015.2416924 – ident: ref25 doi: 10.1109/TFUZZ.2019.2895560 – ident: ref13 doi: 10.1109/TCYB.2019.2944761 – ident: ref33 doi: 10.1002/rnc.4837 – ident: ref15 doi: 10.1109/TFUZZ.2015.2501412 – ident: ref7 doi: 10.1109/TCST.2016.2557224 – ident: ref38 doi: 10.1109/ALLERTON.2009.5394956 – year: 2020 ident: ref2 article-title: Event-based secure leader-following consensus control for multi-agent systems with multiple cyber-attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2937951 – ident: ref37 doi: 10.1016/j.ins.2018.12.091 – ident: ref35 doi: 10.1109/TSMC.2016.2616544 – ident: ref28 doi: 10.1109/TCYB.2018.2802044 – ident: ref27 doi: 10.1109/TIE.2017.2726965 – ident: ref22 doi: 10.1109/TSMC.2018.2888633 – ident: ref14 doi: 10.1109/TFUZZ.2018.2883374 – ident: ref10 doi: 10.1016/j.jfranklin.2018.04.001 – ident: ref12 doi: 10.1109/TIE.2018.2885726 – ident: ref23 doi: 10.1109/TSMC.2018.2875484 – ident: ref39 doi: 10.1109/TAC.2013.2279896 – ident: ref11 doi: 10.1109/TNNLS.2016.2538779 – ident: ref26 doi: 10.1109/TSMC.2019.2912846 – ident: ref21 doi: 10.1109/TFUZZ.2018.2849702 – ident: ref30 doi: 10.1109/TSMC.2018.2834967 – ident: ref34 doi: 10.1109/JSEN.2017.2654325 – ident: ref18 doi: 10.1016/j.automatica.2013.01.038 – ident: ref24 doi: 10.1016/j.ins.2017.09.005 – ident: ref42 doi: 10.1016/j.nahs.2019.03.005 – ident: ref3 doi: 10.1109/TCYB.2016.2608499 – ident: ref16 doi: 10.1109/TCYB.2018.2823362 – ident: ref31 doi: 10.1016/j.automatica.2019.06.019 – ident: ref19 doi: 10.1109/TNNLS.2016.2580609 – ident: ref41 doi: 10.1016/j.automatica.2014.10.067 – ident: ref36 doi: 10.1049/iet-cta.2017.0868 – volume: 16 start-page: 739 year: 2008 ident: ref44 article-title: Filter design for nonlinear systems with time-delay through T-S fuzzy model approach publication-title: IEEE Trans Fuzzy Syst doi: 10.1109/TFUZZ.2007.905915 – ident: ref9 doi: 10.1109/TCYB.2015.2507177 – ident: ref5 doi: 10.1109/TCYB.2018.2828503 – ident: ref6 doi: 10.1109/TCYB.2020.2972384 – ident: ref20 doi: 10.1109/TSMC.2019.2960115 – ident: ref29 doi: 10.1109/TCYB.2018.2864776 – ident: ref32 doi: 10.1016/j.ins.2017.09.042 – ident: ref17 doi: 10.1109/TAC.2012.2206694 – ident: ref4 doi: 10.1109/TAC.2015.2461851 – ident: ref1 doi: 10.1109/TCYB.2018.2839912 – ident: ref8 doi: 10.1109/TSG.2015.2513772 – ident: ref40 doi: 10.1109/TSMC.2019.2896249 |
SSID | ssj0000816898 |
Score | 2.616423 |
Snippet | The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 4000 |
SubjectTerms | Adaptation models Adaptive event-triggered scheme Adaptive systems Control systems Cyberattack Cybersecurity deception attacks Denial of service attacks denial-of-service (DoS) attacks Denial-of-service attack Filter design (mathematics) hybrid cyber attack Linear matrix inequalities secure filtering Stability augmentation Symmetric matrices Systems stability |
Title | Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack |
URI | https://ieeexplore.ieee.org/document/9139283 https://www.proquest.com/docview/2557978518 https://www.proquest.com/docview/2440472729 |
Volume | 51 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61PfUC9IFYKMhIPdAKb2Nn89jjsnS1IJXTVi3iEDn2BKqi7Io6h_LrmfF6IxUQ4mYpk8jReOwZz8z3ARyPRlikrlayUcrJkSqtNEpZadW4QG1oewzV7hef8vnl6ON1dr0Fb_teGEQMxWc45GHI5bul7fiq7IwhLOk43IZtCtzWvVr9fUogkAjUt5oGkryKIiYxVTI-W0w_v6NgUFOMGlhfmcQm1WWZ51o9OJECxcof-3I4bGaP4WIzzXWNye2w8_XQ_vwNwfF__-MJPIpep5isl8kebGG7D3vRru_Emwg-fXIAX8IFPIqJMyveCeU5F0TKBQXxX5nWU8xuOL8u3ofKD3F147-JD-2q84KpPwPhhBemdWJ-z71gYnpfk_TEe2NvD-Fydr6YzmUkYJCWvDovC53WyuomNYXRVmPRqMSkmcM6T5rcJnVic-XIx0FXkuNiM0e6TssEaZBntkmfwk67bPEZCM1QayWj4DaKm2ONaTDFrDS5qhsy_QEkGyVUNqKT85y_VyFKScYVq7BiFVZRhQM47V9ZraE5_iV8wHroBaMKBnC00XQVjfeuoiiroOA6U-UAXvePyew4l2JaXHYkw7iKnMQeP__7l1_Arubyl1AreAQ7_keHL8l_8fWrsHB_ATH06B8 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fT9swED4x9rC9wBibKDDmSXvYprnETvOjj6VQlY3yVDSmPUSO7QACpRU4D_DXc-e6kbahaW-W4kSOzue78919H8DHXs9msSkFr4QwvCdyzZUQmmvRz6xUeDz6avfJaTo-6307T85X4GvbC2Ot9cVntktDn8s3M93QVdk-QViiOXwGz9HuJ2LRrdXeqHgKCU9-K3HA0a_IQhpTRP396fDnAYaDEqNUz_tKNDaxzPM0leI3m-RJVv46mb25Ga3DZLnQRZXJdbdxZVc__IHh-L9_8grWgt_JBouNsgErtn4NG0Gz79inAD_9eRN--St4ywZGzeks5EdUEsmnGMZfELEnG11Rhp0d-toP9uPKXbLjet44RuSfnnLCMVUbNr6nbjA2vC9x9sA5pa_fwNnoaDoc80DBwDX6dY5nMi6FllWsMiW1tFklIhUnxpZpVKU6KiOdCoNejjU5ui46MSjtOI8sDtJEV_FbWK1ntd0CJglsLScc3EpQe6xSlY1tkqtUlBUqfweipRAKHfDJac03hY9Ton5BIixIhEUQYQe-tK_MF-Ac_5q8SXJoJwYRdGB3KekiqO9dgXFWhuF1IvIOfGgfo-JRNkXVdtbgHEJWpDR2f_vpL7-HF-Pp5KQ4OT79vgMvJRXD-MrBXVh1t419h96MK_f8Jn4Ed73raA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Adaptive-Event-Triggered+Filter+Design+With+Input+Constraint+and+Hybrid+Cyber+Attack&rft.jtitle=IEEE+transactions+on+cybernetics&rft.au=Liu%2C+Jinliang&rft.au=Wang%2C+Yuda&rft.au=Cao%2C+Jinde&rft.au=Yue%2C+Dong&rft.date=2021-08-01&rft.issn=2168-2267&rft.eissn=2168-2275&rft.volume=51&rft.issue=8&rft.spage=4000&rft.epage=4010&rft_id=info:doi/10.1109%2FTCYB.2020.3003752&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCYB_2020_3003752 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2267&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2267&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2267&client=summon |