Observer-Based Fixed-Time Secure Tracking Consensus for Networked High-Order Multiagent Systems Against DoS Attacks
This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks m...
Saved in:
Published in | IEEE transactions on cybernetics Vol. 52; no. 4; pp. 2018 - 2031 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
United States
IEEE
01.04.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 2168-2267 2168-2275 2168-2275 |
DOI | 10.1109/TCYB.2020.3005354 |
Cover
Loading…
Abstract | This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples. |
---|---|
AbstractList | This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples. This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples.This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples. |
Author | Ye, Dan Yang, Haijiao |
Author_xml | – sequence: 1 givenname: Haijiao orcidid: 0000-0001-8002-507X surname: Yang fullname: Yang, Haijiao email: bhuyhj51@gmail.com organization: College of Information Science and Engineering, Northeastern University, Shenyang, China – sequence: 2 givenname: Dan orcidid: 0000-0002-5725-8956 surname: Ye fullname: Ye, Dan email: yedan@ise.neu.edu.cn organization: College of Information Science and Engineering, Northeastern University, Shenyang, China |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/32697735$$D View this record in MEDLINE/PubMed |
BookMark | eNp9kc1uEzEUhS1UREvpAyAkZIkNmwn-t2eZBvojFbJIWLCyPDN3gtuJp9geoG-Po6RddIE3vrK-78i65zU6CmMAhN5SMqOU1J_Wix_nM0YYmXFCJJfiBTphVJmKMS2Pnmalj9FZSrekHFOeavMKHXOmaq25PEFp2SSIvyFW5y5Bhy_8X-iqtd8CXkE7RcDr6No7HzZ4MYYEIU0J92PE3yD_GeNdUa785me1jB1E_HUasncbCBmvHlKGbcLzjfMhZfx5XOF5ziUrvUEvezckODvcp-j7xZf14qq6WV5eL-Y3VctFnStRKy5YzxlI3ffKaAZams44ThvVNYLUIHvJiZQ16RpHGspEmeumUdQo0vNT9HGfex_HXxOkbLc-tTAMLsA4JcsEU2VxhpGCfniG3o5TDOV3limhBePG6EK9P1BTs4XO3ke_dfHBPq6zAHoPtHFMKUJvW59d9mPI0fnBUmJ33dldd3bXnT10V0z6zHwM_5_zbu94AHjiayoUV5T_AwG_oks |
CODEN | ITCEB8 |
CitedBy_id | crossref_primary_10_3390_act12010024 crossref_primary_10_1007_s11071_023_08499_3 crossref_primary_10_1016_j_jfranklin_2024_106959 crossref_primary_10_1109_TII_2024_3424273 crossref_primary_10_3390_pr11082329 crossref_primary_10_1007_s11432_022_3792_5 crossref_primary_10_1007_s41870_025_02458_4 crossref_primary_10_1109_TMECH_2022_3229446 crossref_primary_10_1080_00207721_2024_2329739 crossref_primary_10_3390_math12091319 crossref_primary_10_1109_TASE_2024_3423466 crossref_primary_10_3934_electreng_2024015 crossref_primary_10_1109_TCYB_2021_3049786 crossref_primary_10_1016_j_jfranklin_2023_01_015 crossref_primary_10_1080_00207721_2024_2412188 crossref_primary_10_1109_TCSII_2022_3201513 crossref_primary_10_1109_TII_2022_3201589 crossref_primary_10_1016_j_jfranklin_2023_05_037 crossref_primary_10_1109_TCYB_2025_3528200 crossref_primary_10_1109_TNSE_2022_3217618 crossref_primary_10_1080_00207179_2022_2140311 crossref_primary_10_1016_j_isatra_2022_02_002 crossref_primary_10_1002_acs_3496 crossref_primary_10_1016_j_ins_2023_120086 crossref_primary_10_1002_acs_3455 crossref_primary_10_1109_TCYB_2023_3300120 crossref_primary_10_1080_00207721_2024_2409854 crossref_primary_10_1109_TASE_2024_3364231 crossref_primary_10_1002_rnc_7392 crossref_primary_10_1109_TCSII_2023_3325808 crossref_primary_10_1109_TNNLS_2021_3089596 crossref_primary_10_1080_00207179_2024_2397508 crossref_primary_10_1016_j_jfranklin_2023_01_046 crossref_primary_10_1109_TASE_2024_3417387 crossref_primary_10_1002_asjc_2953 crossref_primary_10_1016_j_automatica_2024_112062 crossref_primary_10_1109_TCYB_2023_3338821 crossref_primary_10_1109_TCYB_2024_3467272 crossref_primary_10_1109_TCYB_2022_3200403 crossref_primary_10_1109_TII_2024_3393142 crossref_primary_10_1002_acs_3424 crossref_primary_10_1007_s11071_024_10017_y crossref_primary_10_1016_j_est_2025_115574 crossref_primary_10_1109_TCYB_2023_3235496 crossref_primary_10_1109_TSMC_2023_3339199 crossref_primary_10_1080_00207721_2021_1910876 crossref_primary_10_1109_TFUZZ_2022_3148875 crossref_primary_10_1109_TII_2021_3087184 crossref_primary_10_1109_TCNS_2022_3233927 crossref_primary_10_1109_TSMC_2023_3324142 crossref_primary_10_1016_j_jfranklin_2024_107065 crossref_primary_10_1080_00207721_2024_2377758 crossref_primary_10_1109_LCSYS_2024_3489393 crossref_primary_10_3389_fcomp_2023_1125124 crossref_primary_10_1109_TCYB_2024_3476426 crossref_primary_10_1109_TFUZZ_2020_3013960 crossref_primary_10_1109_LCSYS_2023_3332811 crossref_primary_10_1109_TII_2024_3353916 crossref_primary_10_1109_TCSI_2022_3202340 crossref_primary_10_1109_TIFS_2023_3347969 crossref_primary_10_1109_TCYB_2022_3201909 crossref_primary_10_1109_JSYST_2021_3118333 crossref_primary_10_1109_TCNS_2023_3338249 crossref_primary_10_1109_TCYB_2023_3324179 crossref_primary_10_1016_j_neucom_2022_10_056 crossref_primary_10_1080_00207721_2024_2420248 crossref_primary_10_1002_rnc_7373 crossref_primary_10_1002_rnc_7052 crossref_primary_10_1109_TSMC_2024_3523705 crossref_primary_10_1016_j_eswa_2023_120016 crossref_primary_10_1109_TCYB_2023_3257133 crossref_primary_10_1109_TSMC_2022_3221371 crossref_primary_10_1016_j_eswa_2022_117702 crossref_primary_10_1109_JIOT_2024_3386768 crossref_primary_10_1109_TCYB_2024_3523965 crossref_primary_10_1109_TNNLS_2021_3104978 crossref_primary_10_1002_asjc_3508 crossref_primary_10_1109_TSMC_2020_3042823 |
Cites_doi | 10.1109/TAC.2013.2266831 10.1109/TAC.2019.2936555 10.1016/j.automatica.2019.108557 10.1109/TCYB.2017.2708321 10.1016/j.automatica.2019.04.013 10.1002/rnc.3342 10.1109/TCYB.2019.2925123 10.1016/j.automatica.2014.10.067 10.1109/TCST.2013.2280899 10.1002/rnc.4328 10.1137/1.9781611971446 10.1109/TCYB.2019.2915124 10.1016/j.automatica.2019.01.013 10.1109/TSMC.2019.2905253 10.1002/rnc.2997 10.1007/978-94-015-7793-9 10.1109/TAC.2015.2416924 10.1109/TSMC.2016.2616544 10.1109/TII.2018.2817248 10.1109/TAC.2011.2179869 10.1137/060675861 10.1016/0024-3795(92)90016-4 10.1109/TAC.2017.2660298 10.1016/j.ins.2016.08.054 10.1109/TCYB.2019.2955543 10.1109/TCYB.2017.2787740 10.1016/j.ins.2018.04.016 10.1109/TAC.2004.831186 10.1109/TCYB.2017.2782731 10.1016/j.sysconle.2017.01.004 10.1109/TII.2019.2905295 10.1016/j.automatica.2015.01.021 10.1109/TCYB.2016.2570860 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION NPM 7SC 7SP 7TB 8FD F28 FR3 H8D JQ2 L7M L~C L~D 7X8 |
DOI | 10.1109/TCYB.2020.3005354 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef PubMed Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Aerospace Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional MEDLINE - Academic |
DatabaseTitle | CrossRef PubMed Aerospace Database Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional MEDLINE - Academic |
DatabaseTitleList | PubMed Aerospace Database MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Sciences (General) |
EISSN | 2168-2275 |
EndPage | 2031 |
ExternalDocumentID | 32697735 10_1109_TCYB_2020_3005354 9146361 |
Genre | orig-research Journal Article |
GrantInformation_xml | – fundername: LiaoNing Revitalization Talents Program grantid: XLYC19070354 funderid: 10.13039/501100018617 – fundername: Fundamental Research Funds for the Central Universities grantid: N2004027 funderid: 10.13039/501100012226 – fundername: National Natural Science Foundation of China grantid: 61773097; U1813214 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION RIG NPM 7SC 7SP 7TB 8FD F28 FR3 H8D JQ2 L7M L~C L~D 7X8 |
ID | FETCH-LOGICAL-c349t-496342f32e57ff6872e758d8a31b6db409e5f5305590dba0b1245599bb61860f3 |
IEDL.DBID | RIE |
ISSN | 2168-2267 2168-2275 |
IngestDate | Fri Jul 11 09:43:13 EDT 2025 Mon Jun 30 04:34:55 EDT 2025 Thu Jan 02 22:55:22 EST 2025 Tue Jul 01 00:53:56 EDT 2025 Thu Apr 24 22:58:43 EDT 2025 Wed Aug 27 02:40:50 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c349t-496342f32e57ff6872e758d8a31b6db409e5f5305590dba0b1245599bb61860f3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0002-5725-8956 0000-0001-8002-507X |
PMID | 32697735 |
PQID | 2647423887 |
PQPubID | 85422 |
PageCount | 14 |
ParticipantIDs | crossref_citationtrail_10_1109_TCYB_2020_3005354 pubmed_primary_32697735 proquest_miscellaneous_2426535820 proquest_journals_2647423887 crossref_primary_10_1109_TCYB_2020_3005354 ieee_primary_9146361 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-04-01 |
PublicationDateYYYYMMDD | 2022-04-01 |
PublicationDate_xml | – month: 04 year: 2022 text: 2022-04-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States – name: Piscataway |
PublicationTitle | IEEE transactions on cybernetics |
PublicationTitleAbbrev | TCYB |
PublicationTitleAlternate | IEEE Trans Cybern |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref9 doi: 10.1109/TAC.2013.2266831 – ident: ref25 doi: 10.1109/TAC.2019.2936555 – ident: ref7 doi: 10.1016/j.automatica.2019.108557 – ident: ref3 doi: 10.1109/TCYB.2017.2708321 – ident: ref22 doi: 10.1016/j.automatica.2019.04.013 – ident: ref14 doi: 10.1002/rnc.3342 – ident: ref33 doi: 10.1109/TCYB.2019.2925123 – ident: ref6 doi: 10.1016/j.automatica.2014.10.067 – ident: ref8 doi: 10.1109/TCST.2013.2280899 – ident: ref21 doi: 10.1002/rnc.4328 – ident: ref30 doi: 10.1137/1.9781611971446 – ident: ref11 doi: 10.1109/TCYB.2019.2915124 – ident: ref5 doi: 10.1016/j.automatica.2019.01.013 – ident: ref12 doi: 10.1109/TSMC.2019.2905253 – ident: ref16 doi: 10.1002/rnc.2997 – ident: ref28 doi: 10.1007/978-94-015-7793-9 – ident: ref13 doi: 10.1109/TAC.2015.2416924 – ident: ref10 doi: 10.1109/TSMC.2016.2616544 – ident: ref27 doi: 10.1109/TII.2018.2817248 – ident: ref20 doi: 10.1109/TAC.2011.2179869 – ident: ref19 doi: 10.1137/060675861 – ident: ref31 doi: 10.1016/0024-3795(92)90016-4 – ident: ref32 doi: 10.1109/TAC.2017.2660298 – ident: ref17 doi: 10.1016/j.ins.2016.08.054 – ident: ref24 doi: 10.1109/TCYB.2019.2955543 – ident: ref15 doi: 10.1109/TCYB.2017.2787740 – ident: ref26 doi: 10.1016/j.ins.2018.04.016 – ident: ref29 doi: 10.1109/TAC.2004.831186 – ident: ref4 doi: 10.1109/TCYB.2017.2782731 – ident: ref18 doi: 10.1016/j.sysconle.2017.01.004 – ident: ref1 doi: 10.1109/TII.2019.2905295 – ident: ref23 doi: 10.1016/j.automatica.2015.01.021 – ident: ref2 doi: 10.1109/TCYB.2016.2570860 |
SSID | ssj0000816898 |
Score | 2.5929632 |
Snippet | This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS... |
SourceID | proquest pubmed crossref ieee |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 2018 |
SubjectTerms | Algorithms Connectivity Decentralized control Defense strategy Denial of service attacks denial-of-service (DoS) attacks Denial-of-service attack fixed-time control Multi-agent systems Multiagent systems Network topology nonlinear multiagent systems (MASs) Nonlinear systems Observers Stability analysis Switches Topology Tracking Transient analysis Transient performance |
Title | Observer-Based Fixed-Time Secure Tracking Consensus for Networked High-Order Multiagent Systems Against DoS Attacks |
URI | https://ieeexplore.ieee.org/document/9146361 https://www.ncbi.nlm.nih.gov/pubmed/32697735 https://www.proquest.com/docview/2647423887 https://www.proquest.com/docview/2426535820 |
Volume | 52 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NbxMxEB2VnnoB2vKxUCpX4kArnDr2bhIf00JUIbU9tJXKabW2x6gCJajZSIhfz4zX2UoIELeV4t18zDjzZjzvDcDbgBZ9NEZOojeSIp6WtlRRTrCMMYSqNIbZyOcXo7Ob8tNtdbsB73suDCKm5jMc8GU6yw8Lv-JS2bEdsrwV5TqPKHHruFp9PSUNkEijbzVdSEIV43yIOVT2-Pr08wklg5py1KRowuN4CLgQ-Elz3h4iUhqx8ne0maLO7Amcrz9v12zydbBq3cD__E3K8X-_0FN4nOGnmHb-sg0bON-B7bzBl-JdVqE-3IXlpeOCLd7LEwp0QczufmCQzBgRqUaPgsKc50K74KGfPDFjKQgBi4uusZxu4R4SecnaniLxfBumcYmskS6mX5o7wqbiw-JKTNuWuf7P4Gb28fr0TOYJDdKb0raypO1b6mg0VuMYR5OxRso_wqQxQzcKjnJHrGLFomJWBdcoR2iCJc6cY5l-Fc1z2Jwv5vgShIpaDyPhT00_SjUOVkcWR6OHGqu8jwWotZVqn-XLeYrGtzqlMcrWbOOabVxnGxdw1N_yvdPu-NfiXbZPvzCbpoC9tSvUeXcvawKRfMBN_88FHPQv077kw5ZmjosVrSHoUzENWRXwonOh_tlrz3v15_d8DVuaSRapP2gPNtv7Fb4h6NO6_eTzvwBa8PrU |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB5V5QAXSikPtwUWiQMgNl3v2kn2mBaiAE16IJXKyfK-UNUqqRpHQvx6ZtYbIyFA3Cxl7TxmNvPN7Mz3AbxyXnsblOLDYBXHiCe5LkTgQ1-E4FxZKEXTyNNZf3JefLooL7bgXTcL472PzWe-R5fxLN8t7ZpKZUc6J3orzHXuYNwv83Zaq6uoRAmJKH4r8YIjrhikY8xc6KP5yddjTAclZqmR04QEeRC6IPyJSm-_YlIUWfk73oxxZ7wD080nbttNrnrrxvTsj9_IHP_3Kz2A-wmAslHrMbuw5RcPYTdt8RV7nXio3-zB6sxQydbf8mMMdY6NL797x2lmhMUqvWcY6CyV2hnJfpJmxoohBmaztrUcb6EuEn5G7J4sTvrWNMjFEks6G32rLxGdsvfLL2zUNDTt_wjOxx_mJxOeNBq4VYVueIEbuJBBSV8OQugPB9JjBuKGtcpN3xnMHn0ZSqIV08KZWhjEE0RyZgwR9YugHsP2YrnwT4GJIGUeEIFK_FHKgdMyED0aPlRpYW3IQGysVNlEYE46GtdVTGSErsjGFdm4SjbO4G13y03L3vGvxXtkn25hMk0GhxtXqNL-XlUII-mIG_-hM3jZvYw7k45b6oVfrnENgp-SBpFFBk9aF-qevfG8_T-_5wu4O5lPT6vTj7PPB3BP0shF7BY6hO3mdu2fIRBqzPPo_z8BmJH-HQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Observer-Based+Fixed-Time+Secure+Tracking+Consensus+for+Networked+High-Order+Multiagent+Systems+Against+DoS+Attacks&rft.jtitle=IEEE+transactions+on+cybernetics&rft.au=Yang%2C+Haijiao&rft.au=Ye%2C+Dan&rft.date=2022-04-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=2168-2267&rft.eissn=2168-2275&rft.volume=52&rft.issue=4&rft.spage=2018&rft_id=info:doi/10.1109%2FTCYB.2020.3005354&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2267&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2267&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2267&client=summon |