Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks
This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as...
Saved in:
Published in | IEEE transactions on systems, man, and cybernetics. Systems Vol. 51; no. 6; pp. 3926 - 3938 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.06.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as regulated by two sequences of Bernoulli distributed random variables with certain probabilities. A novel observer-based PID controller is proposed such that the closed-loop system achieves the desired security level and the quadratic cost criterion (QCC) has an upper bound. Sufficient conditions are derived under which the exponentially mean-square input-to-state stability is guaranteed and the desired security level is then achieved. Subsequently, an upper bound of the QCC is obtained and the explicit expression of the desired PID controller is also parameterized. Finally, the validity of the developed design approach is verified via an illustrative example. |
---|---|
AbstractList | This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems subject to cyber-attacks. The cyber-attacks, which include both denial-of-service and deception attacks, are allowed to be randomly occurring as regulated by two sequences of Bernoulli distributed random variables with certain probabilities. A novel observer-based PID controller is proposed such that the closed-loop system achieves the desired security level and the quadratic cost criterion (QCC) has an upper bound. Sufficient conditions are derived under which the exponentially mean-square input-to-state stability is guaranteed and the desired security level is then achieved. Subsequently, an upper bound of the QCC is obtained and the explicit expression of the desired PID controller is also parameterized. Finally, the validity of the developed design approach is verified via an illustrative example. |
Author | Wei, Guoliang Ho, Daniel W. C. Zhao, Di Wang, Zidong |
Author_xml | – sequence: 1 givenname: Di orcidid: 0000-0002-8575-0294 surname: Zhao fullname: Zhao, Di email: zhaodi0907520@163.com organization: Department of Control Science and Engineering, Shanghai Key Laboratory of Modern Optical System, University of Shanghai for Science and Technology, Shanghai, China – sequence: 2 givenname: Zidong orcidid: 0000-0002-9576-7401 surname: Wang fullname: Wang, Zidong email: zidong.wang@brunel.ac.uk organization: Department of Computer Science, Brunel University London, Uxbridge, U.K – sequence: 3 givenname: Daniel W. C. orcidid: 0000-0001-9799-3712 surname: Ho fullname: Ho, Daniel W. C. email: madaniel@cityu.edu.hk organization: Department of Mathematics, City University of Hong Kong, Hong Kong – sequence: 4 givenname: Guoliang surname: Wei fullname: Wei, Guoliang email: guoliang.wei@usst.edu.cn organization: College of Science, University of Shanghai for Science and Technology, Shanghai, China |
BookMark | eNp9kEtLw0AUhQepYK39AeJmwHXqPDLJZFlTH4VKhba4HGYmN5DaJnVmKuTfm9DiwoWrexfnOwe-azSomxoQuqVkQinJHtart3zCCM0mLBNM8OwCDRlNZMQYZ4PfnyZXaOz9lhBCmUw4SYboY2k8uG9w0aP2UOD3-QyvwB5dFVqcN3VwzQ6XjcOzylsHAfC62kM0g51u8ar1AfYeb-oCHM5b09VMQ9D209-gy1LvPIzPd4Q2z0_r_DVaLF_m-XQRWc6TEJmUl4YKLUsZGyaJYCmVlMeiKEhhSp7RgthMCkqMsTFozUSZlrqwgnPLYspH6P7Ue3DN1xF8UNvm6OpuUjHBZBazVPQpekpZ13jvoFQHV-21axUlqleoeoWqV6jOCjsm_cPYKuhQ9U50tfuXvDuRFQD8LsmMxUln_Qda_X-A |
CODEN | ITSMFE |
CitedBy_id | crossref_primary_10_1002_rnc_4963 crossref_primary_10_1109_TIFS_2022_3160355 crossref_primary_10_1109_TNNLS_2021_3106383 crossref_primary_10_1109_TCSI_2021_3116278 crossref_primary_10_1007_s11432_022_3684_x crossref_primary_10_1109_TCYB_2022_3222171 crossref_primary_10_1080_00207721_2020_1740823 crossref_primary_10_1109_TSIPN_2021_3097217 crossref_primary_10_3390_s23135773 crossref_primary_10_1016_j_neucom_2020_02_064 crossref_primary_10_1016_j_isatra_2023_04_018 crossref_primary_10_1016_j_jfranklin_2023_11_025 crossref_primary_10_1016_j_isatra_2022_09_039 crossref_primary_10_1109_TSMC_2024_3357776 crossref_primary_10_1109_TCYB_2020_3021350 crossref_primary_10_1002_oca_3084 crossref_primary_10_1016_j_isatra_2022_02_001 crossref_primary_10_3390_pr11051375 crossref_primary_10_1002_rnc_5844 crossref_primary_10_1007_s40997_023_00596_3 crossref_primary_10_1002_rnc_5328 crossref_primary_10_1002_rnc_5205 crossref_primary_10_1109_TSMC_2020_3041121 crossref_primary_10_3390_math12081146 crossref_primary_10_1109_TFUZZ_2022_3222905 crossref_primary_10_1002_mma_9386 crossref_primary_10_1016_j_neucom_2020_04_046 crossref_primary_10_1109_TCYB_2020_3021982 crossref_primary_10_1016_j_jfranklin_2022_12_034 crossref_primary_10_1007_s00034_023_02484_2 crossref_primary_10_1109_TSMC_2023_3251355 crossref_primary_10_1016_j_ins_2024_120613 crossref_primary_10_1109_TNNLS_2022_3160627 crossref_primary_10_1109_TII_2024_3363091 crossref_primary_10_1109_TSMC_2022_3205153 crossref_primary_10_1016_j_neucom_2022_05_096 crossref_primary_10_1109_TSMC_2021_3090024 crossref_primary_10_1016_j_nahs_2021_101117 crossref_primary_10_1016_j_neucom_2020_05_011 crossref_primary_10_1109_TNET_2022_3183862 crossref_primary_10_1109_TCC_2024_3480194 crossref_primary_10_1109_TCSII_2022_3220019 crossref_primary_10_1109_TSMC_2022_3160510 crossref_primary_10_1016_j_amc_2021_126535 crossref_primary_10_1016_j_jfranklin_2023_03_007 crossref_primary_10_1016_j_jfranklin_2022_11_048 crossref_primary_10_1007_s11063_023_11426_7 crossref_primary_10_1109_TSIPN_2020_3046220 crossref_primary_10_1002_rnc_7744 crossref_primary_10_1080_00207179_2020_1798020 crossref_primary_10_1155_2022_6122921 crossref_primary_10_1016_j_asoc_2020_106960 crossref_primary_10_1109_TSMC_2024_3509629 crossref_primary_10_1002_int_23036 crossref_primary_10_1109_JSYST_2021_3064920 crossref_primary_10_1109_TNSE_2022_3223040 crossref_primary_10_1109_ACCESS_2020_3044147 crossref_primary_10_1080_00207721_2020_1765219 crossref_primary_10_1002_rnc_6919 crossref_primary_10_1109_TFUZZ_2023_3262609 crossref_primary_10_1109_TASE_2023_3343752 crossref_primary_10_1016_j_jfranklin_2024_106760 crossref_primary_10_1109_TCYB_2020_3004288 crossref_primary_10_1002_rnc_7695 crossref_primary_10_1016_j_jfranklin_2022_01_042 |
Cites_doi | 10.1109/TAC.2016.2612818 10.1109/TIE.2011.2107720 10.1109/JSEN.2017.2654325 10.1109/TCYB.2018.2863664 10.1080/21642583.2017.1355760 10.1016/0005-1098(94)00130-B 10.1109/JAS.2017.7510727 10.1016/S0020-0255(99)00127-9 10.1007/s12555-013-0139-0 10.1109/TFUZZ.2016.2641023 10.1109/TSMC.2017.2733542 10.1109/TAC.2019.2929817 10.1109/TAC.2013.2279896 10.1109/TSMC.2017.2719629 10.1109/TCYB.2019.2918760 10.1016/j.neucom.2014.11.052 10.1109/TII.2016.2607150 10.1007/978-1-4471-3651-4 10.1109/TII.2015.2506545 10.1109/TCYB.2018.2840430 10.1109/TSMC.2017.2681698 10.1109/TCYB.2018.2852290 10.1016/j.automatica.2008.01.012 10.1109/TCYB.2019.2921733 10.1016/j.automatica.2015.09.037 10.1016/j.chaos.2004.12.013 10.1016/S0005-1098(01)00028-0 10.1109/TSMC.2017.2719960 10.1109/TCST.2016.2557278 10.1109/TSMC.2016.2616544 10.1080/21642583.2018.1494639 10.1016/j.nahs.2017.07.005 10.1109/TAC.2019.2910167 10.1002/rnc.3623 10.1049/iet-cta.2016.0135 10.1016/S0167-6911(01)00164-5 10.1109/TCYB.2018.2843358 10.1109/TSMC.2018.2874508 10.1109/TCYB.2017.2671032 10.1109/TSMC.2019.2918002 10.1109/TSMC.2018.2814539 10.1109/TCYB.2017.2707590 10.1109/TIE.2009.2018433 10.1016/j.jmaa.2010.11.038 10.1016/j.automatica.2016.12.026 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 H8D JQ2 L7M L~C L~D |
DOI | 10.1109/TSMC.2019.2952539 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database Aerospace Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Aerospace Database Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Aerospace Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2168-2232 |
EndPage | 3938 |
ExternalDocumentID | 10_1109_TSMC_2019_2952539 8924686 |
Genre | orig-research |
GrantInformation_xml | – fundername: Research Grants Council of Hong Kong Special Administrative Region grantid: 9042223; CityU 11200717 funderid: 10.13039/501100002920 – fundername: Alexander von Humboldt Foundation of Germany funderid: 10.13039/100005156 – fundername: National Natural Science Foundation of China grantid: 61873148; 61873169; 61933007 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 H8D JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c336t-b73fb15a8f84b280527181345dd0dbf391d0c98510bbc4eaa25f7fadc533c2413 |
IEDL.DBID | RIE |
ISSN | 2168-2216 |
IngestDate | Mon Jun 30 06:03:42 EDT 2025 Thu Apr 24 22:53:59 EDT 2025 Tue Jul 01 02:29:13 EDT 2025 Wed Aug 27 02:30:24 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c336t-b73fb15a8f84b280527181345dd0dbf391d0c98510bbc4eaa25f7fadc533c2413 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8575-0294 0000-0002-9576-7401 0000-0001-9799-3712 |
OpenAccessLink | http://bura.brunel.ac.uk/bitstream/2438/23448/7/FullText.pdf |
PQID | 2528942751 |
PQPubID | 75739 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1109_TSMC_2019_2952539 proquest_journals_2528942751 crossref_citationtrail_10_1109_TSMC_2019_2952539 ieee_primary_8924686 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-06-01 |
PublicationDateYYYYMMDD | 2021-06-01 |
PublicationDate_xml | – month: 06 year: 2021 text: 2021-06-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on systems, man, and cybernetics. Systems |
PublicationTitleAbbrev | TSMC |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref11 ref10 ref17 ref16 ref18 ref50 ref45 ref47 ref42 ref41 ref44 ref43 ref49 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref34 ref37 ref36 ref31 ref30 ref33 ref32 ziegler (ref46) 1942; 64 ref2 ang (ref1) 2005; 3 ref39 ref38 zou (ref48) 0 ref24 ref23 ref26 ref25 ref20 ref22 ref21 wang (ref35) 0 kim (ref19) 2006; 4 ref28 ref27 ref29 |
References_xml | – ident: ref4 doi: 10.1109/TAC.2016.2612818 – ident: ref40 doi: 10.1109/TIE.2011.2107720 – ident: ref24 doi: 10.1109/JSEN.2017.2654325 – ident: ref32 doi: 10.1109/TCYB.2018.2863664 – year: 0 ident: ref35 article-title: Observer-based fuzzy output-feedback control for discrete-time strict-feedback nonlinear systems with stochastic noises publication-title: IEEE Trans Cybern – ident: ref21 doi: 10.1080/21642583.2017.1355760 – ident: ref15 doi: 10.1016/0005-1098(94)00130-B – ident: ref37 doi: 10.1109/JAS.2017.7510727 – ident: ref2 doi: 10.1016/S0020-0255(99)00127-9 – ident: ref28 doi: 10.1007/s12555-013-0139-0 – ident: ref41 doi: 10.1109/TFUZZ.2016.2641023 – ident: ref3 doi: 10.1109/TSMC.2017.2733542 – ident: ref23 doi: 10.1109/TAC.2019.2929817 – volume: 64 start-page: 759 year: 1942 ident: ref46 article-title: Optimum settings for automatic controllers publication-title: ASME Trans – year: 0 ident: ref48 article-title: Full information estimation for time-varying systems with round-Robin protocol: A recursive filter approach publication-title: IEEE Trans Syst Man Cybern Syst – ident: ref45 doi: 10.1109/TAC.2013.2279896 – ident: ref26 doi: 10.1109/TSMC.2017.2719629 – ident: ref16 doi: 10.1109/TCYB.2019.2918760 – ident: ref44 doi: 10.1016/j.neucom.2014.11.052 – ident: ref43 doi: 10.1109/TII.2016.2607150 – volume: 4 start-page: 624 year: 2006 ident: ref19 article-title: A biologically inspired intelligent PID controller tuning for AVR systems publication-title: Int J Control Autom Syst – ident: ref9 doi: 10.1007/978-1-4471-3651-4 – ident: ref42 doi: 10.1109/TII.2015.2506545 – ident: ref39 doi: 10.1109/TCYB.2018.2840430 – ident: ref29 doi: 10.1109/TSMC.2017.2681698 – ident: ref7 doi: 10.1109/TCYB.2018.2852290 – ident: ref14 doi: 10.1016/j.automatica.2008.01.012 – ident: ref34 doi: 10.1109/TCYB.2019.2921733 – ident: ref10 doi: 10.1016/j.automatica.2015.09.037 – ident: ref5 doi: 10.1016/j.chaos.2004.12.013 – volume: 3 start-page: 559 year: 2005 ident: ref1 article-title: PID control system analysis, design, and technology publication-title: IEEE Trans Control Syst Technol – ident: ref17 doi: 10.1016/S0005-1098(01)00028-0 – ident: ref20 doi: 10.1109/TSMC.2017.2719960 – ident: ref27 doi: 10.1109/TCST.2016.2557278 – ident: ref13 doi: 10.1109/TSMC.2016.2616544 – ident: ref22 doi: 10.1080/21642583.2018.1494639 – ident: ref6 doi: 10.1016/j.nahs.2017.07.005 – ident: ref50 doi: 10.1109/TAC.2019.2910167 – ident: ref31 doi: 10.1002/rnc.3623 – ident: ref11 doi: 10.1049/iet-cta.2016.0135 – ident: ref18 doi: 10.1016/S0167-6911(01)00164-5 – ident: ref25 doi: 10.1109/TCYB.2018.2843358 – ident: ref47 doi: 10.1109/TSMC.2018.2874508 – ident: ref33 doi: 10.1109/TCYB.2017.2671032 – ident: ref49 doi: 10.1109/TSMC.2019.2918002 – ident: ref30 doi: 10.1109/TSMC.2018.2814539 – ident: ref38 doi: 10.1109/TCYB.2017.2707590 – ident: ref8 doi: 10.1109/TIE.2009.2018433 – ident: ref36 doi: 10.1016/j.jmaa.2010.11.038 – ident: ref12 doi: 10.1016/j.automatica.2016.12.026 |
SSID | ssj0001286306 |
Score | 2.4598348 |
Snippet | This article deals with the observer-based proportional-integral-derivative (PID) security control problem for a kind of linear discrete time-delay systems... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3926 |
SubjectTerms | Controllers Cybersecurity Deception attacks Delays Denial of service attacks denial-of-service (DoS) attacks Discrete time systems exponentially mean-square input-to-state stability (ISS) Feedback control observer-based proportional-integral-derivative (PID) control Observers PD control PI control Proportional integral derivative Random variables Security security control Time delay systems Tuning Upper bound Upper bounds |
Title | Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks |
URI | https://ieeexplore.ieee.org/document/8924686 https://www.proquest.com/docview/2528942751 |
Volume | 51 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT9swFH8qnOAwNj60Qpl84DTNrb-THKEFdZPKJtGK3qL4I9I0VCaWHspfP9txqwrQtEuUgx0579l-3-8HcKG0y6ioCM6oLrCoa4O14RxTK1RFi4qbLBQ4T27VeCa-zeW8A182tTDOuZh85vrhNcby7aNZBlfZIPfGgsrVDux4w62t1dryp-SKRyhNRpVnvn-mICYlxWB6NxmGPK6izwrJZIAG3xJDEVfl1WUcJczNAUzWa2sTS371l43um-cXbRv_d_Hv4V1SNdFluzc-QMctDmF_qwHhEdx_18Er657wlZdmFv34OkJ3CdEODdssduTVWjT66a8Xr1-jUDKCR-6hWqHU7BxF6CQ0XGn_mcumCUX7xzC7uZ4OxzhBLWDPGNVgnfFaU1nldS40CzAHXmZRLqS1xOqaF9QSU3jtjGhthKsqJuusrqzx2qIJobkT2F08LtxHQIIya6nlhuRGcP_LxCppstxwY2Re2y6QNeVLk_qQBziMhzLaI6QoA7PKwKwyMasLnzdTfrdNOP41-CgQfzMw0b0LvTV7y3RM_5RMentTsEzS07dnncEeC0ks0e3Sg93maenOvRbS6E9x-_0F0-XXzQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT9swFH9icGA7jK-hdcDmAyeEi7-THKEFlUEBiaJxi-KPSAhUEKQH9tfPdtyqgmnaJcrBjpz3bL_v9wPYVdplVFQEZ1QXWNS1wdpwjqkVqqJFxU0WCpyHF2pwI37eytsF2J_VwjjnYvKZ64bXGMu3j2YSXGUHuTcWVK4-wJKX-5K11VpzHpVc8Qimyajy7PfPFMakpDgYXQ97IZOr6LJCMhnAwecEUURWeXcdRxlzsgLD6era1JL77qTRXfP7TePG_13-KnxOyiY6bHfHGiy48Tp8mmtBuAG_LnXwy7pnfOTlmUVXp310nTDtUK_NY0desUX9O3_BeA0bhaIR3HcP1StK7c5RBE9CvVftP3PYNKFs_wvcnByPegOcwBawZ41qsM54rams8joXmgWgAy-1KBfSWmJ1zQtqiSm8fka0NsJVFZN1VlfWeH3RhODcJiyOH8fuKyBBmbXUckNyI7j_ZWKVNFluuDEyr20HyJTypUmdyAMgxkMZLRJSlIFZZWBWmZjVgb3ZlKe2Dce_Bm8E4s8GJrp3YHvK3jId1JeSSW9xCpZJ-u3vs37A8mA0PC_PTy_OtuAjCykt0QmzDYvN88TteJ2k0d_jVvwDRCDbFw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Observer-Based+PID+Security+Control+for+Discrete+Time-Delay+Systems+Under+Cyber-Attacks&rft.jtitle=IEEE+transactions+on+systems%2C+man%2C+and+cybernetics.+Systems&rft.au=Zhao%2C+Di&rft.au=Wang%2C+Zidong&rft.au=Ho%2C+Daniel+W.+C.&rft.au=Wei%2C+Guoliang&rft.date=2021-06-01&rft.issn=2168-2216&rft.eissn=2168-2232&rft.volume=51&rft.issue=6&rft.spage=3926&rft.epage=3938&rft_id=info:doi/10.1109%2FTSMC.2019.2952539&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSMC_2019_2952539 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2216&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2216&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2216&client=summon |