Observer-Based Fixed-Time Secure Tracking Consensus for Networked High-Order Multiagent Systems Against DoS Attacks

This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks m...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on cybernetics Vol. 52; no. 4; pp. 2018 - 2031
Main Authors Yang, Haijiao, Ye, Dan
Format Journal Article
LanguageEnglish
Published United States IEEE 01.04.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2168-2267
2168-2275
2168-2275
DOI10.1109/TCYB.2020.3005354

Cover

Loading…
Abstract This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples.
AbstractList This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples.
This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples.This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples.
Author Ye, Dan
Yang, Haijiao
Author_xml – sequence: 1
  givenname: Haijiao
  orcidid: 0000-0001-8002-507X
  surname: Yang
  fullname: Yang, Haijiao
  email: bhuyhj51@gmail.com
  organization: College of Information Science and Engineering, Northeastern University, Shenyang, China
– sequence: 2
  givenname: Dan
  orcidid: 0000-0002-5725-8956
  surname: Ye
  fullname: Ye, Dan
  email: yedan@ise.neu.edu.cn
  organization: College of Information Science and Engineering, Northeastern University, Shenyang, China
BackLink https://www.ncbi.nlm.nih.gov/pubmed/32697735$$D View this record in MEDLINE/PubMed
BookMark eNp9kc1uEzEUhS1UREvpAyAkZIkNmwn-t2eZBvojFbJIWLCyPDN3gtuJp9geoG-Po6RddIE3vrK-78i65zU6CmMAhN5SMqOU1J_Wix_nM0YYmXFCJJfiBTphVJmKMS2Pnmalj9FZSrekHFOeavMKHXOmaq25PEFp2SSIvyFW5y5Bhy_8X-iqtd8CXkE7RcDr6No7HzZ4MYYEIU0J92PE3yD_GeNdUa785me1jB1E_HUasncbCBmvHlKGbcLzjfMhZfx5XOF5ziUrvUEvezckODvcp-j7xZf14qq6WV5eL-Y3VctFnStRKy5YzxlI3ffKaAZams44ThvVNYLUIHvJiZQ16RpHGspEmeumUdQo0vNT9HGfex_HXxOkbLc-tTAMLsA4JcsEU2VxhpGCfniG3o5TDOV3limhBePG6EK9P1BTs4XO3ke_dfHBPq6zAHoPtHFMKUJvW59d9mPI0fnBUmJ33dldd3bXnT10V0z6zHwM_5_zbu94AHjiayoUV5T_AwG_oks
CODEN ITCEB8
CitedBy_id crossref_primary_10_3390_act12010024
crossref_primary_10_1007_s11071_023_08499_3
crossref_primary_10_1016_j_jfranklin_2024_106959
crossref_primary_10_1109_TII_2024_3424273
crossref_primary_10_3390_pr11082329
crossref_primary_10_1007_s11432_022_3792_5
crossref_primary_10_1007_s41870_025_02458_4
crossref_primary_10_1109_TMECH_2022_3229446
crossref_primary_10_1080_00207721_2024_2329739
crossref_primary_10_3390_math12091319
crossref_primary_10_1109_TASE_2024_3423466
crossref_primary_10_3934_electreng_2024015
crossref_primary_10_1109_TCYB_2021_3049786
crossref_primary_10_1016_j_jfranklin_2023_01_015
crossref_primary_10_1080_00207721_2024_2412188
crossref_primary_10_1109_TCSII_2022_3201513
crossref_primary_10_1109_TII_2022_3201589
crossref_primary_10_1016_j_jfranklin_2023_05_037
crossref_primary_10_1109_TCYB_2025_3528200
crossref_primary_10_1109_TNSE_2022_3217618
crossref_primary_10_1080_00207179_2022_2140311
crossref_primary_10_1016_j_isatra_2022_02_002
crossref_primary_10_1002_acs_3496
crossref_primary_10_1016_j_ins_2023_120086
crossref_primary_10_1002_acs_3455
crossref_primary_10_1109_TCYB_2023_3300120
crossref_primary_10_1080_00207721_2024_2409854
crossref_primary_10_1109_TASE_2024_3364231
crossref_primary_10_1002_rnc_7392
crossref_primary_10_1109_TCSII_2023_3325808
crossref_primary_10_1109_TNNLS_2021_3089596
crossref_primary_10_1080_00207179_2024_2397508
crossref_primary_10_1016_j_jfranklin_2023_01_046
crossref_primary_10_1109_TASE_2024_3417387
crossref_primary_10_1002_asjc_2953
crossref_primary_10_1016_j_automatica_2024_112062
crossref_primary_10_1109_TCYB_2023_3338821
crossref_primary_10_1109_TCYB_2024_3467272
crossref_primary_10_1109_TCYB_2022_3200403
crossref_primary_10_1109_TII_2024_3393142
crossref_primary_10_1002_acs_3424
crossref_primary_10_1007_s11071_024_10017_y
crossref_primary_10_1016_j_est_2025_115574
crossref_primary_10_1109_TCYB_2023_3235496
crossref_primary_10_1109_TSMC_2023_3339199
crossref_primary_10_1080_00207721_2021_1910876
crossref_primary_10_1109_TFUZZ_2022_3148875
crossref_primary_10_1109_TII_2021_3087184
crossref_primary_10_1109_TCNS_2022_3233927
crossref_primary_10_1109_TSMC_2023_3324142
crossref_primary_10_1016_j_jfranklin_2024_107065
crossref_primary_10_1080_00207721_2024_2377758
crossref_primary_10_1109_LCSYS_2024_3489393
crossref_primary_10_3389_fcomp_2023_1125124
crossref_primary_10_1109_TCYB_2024_3476426
crossref_primary_10_1109_TFUZZ_2020_3013960
crossref_primary_10_1109_LCSYS_2023_3332811
crossref_primary_10_1109_TII_2024_3353916
crossref_primary_10_1109_TCSI_2022_3202340
crossref_primary_10_1109_TIFS_2023_3347969
crossref_primary_10_1109_TCYB_2022_3201909
crossref_primary_10_1109_JSYST_2021_3118333
crossref_primary_10_1109_TCNS_2023_3338249
crossref_primary_10_1109_TCYB_2023_3324179
crossref_primary_10_1016_j_neucom_2022_10_056
crossref_primary_10_1080_00207721_2024_2420248
crossref_primary_10_1002_rnc_7373
crossref_primary_10_1002_rnc_7052
crossref_primary_10_1109_TSMC_2024_3523705
crossref_primary_10_1016_j_eswa_2023_120016
crossref_primary_10_1109_TCYB_2023_3257133
crossref_primary_10_1109_TSMC_2022_3221371
crossref_primary_10_1016_j_eswa_2022_117702
crossref_primary_10_1109_JIOT_2024_3386768
crossref_primary_10_1109_TCYB_2024_3523965
crossref_primary_10_1109_TNNLS_2021_3104978
crossref_primary_10_1002_asjc_3508
crossref_primary_10_1109_TSMC_2020_3042823
Cites_doi 10.1109/TAC.2013.2266831
10.1109/TAC.2019.2936555
10.1016/j.automatica.2019.108557
10.1109/TCYB.2017.2708321
10.1016/j.automatica.2019.04.013
10.1002/rnc.3342
10.1109/TCYB.2019.2925123
10.1016/j.automatica.2014.10.067
10.1109/TCST.2013.2280899
10.1002/rnc.4328
10.1137/1.9781611971446
10.1109/TCYB.2019.2915124
10.1016/j.automatica.2019.01.013
10.1109/TSMC.2019.2905253
10.1002/rnc.2997
10.1007/978-94-015-7793-9
10.1109/TAC.2015.2416924
10.1109/TSMC.2016.2616544
10.1109/TII.2018.2817248
10.1109/TAC.2011.2179869
10.1137/060675861
10.1016/0024-3795(92)90016-4
10.1109/TAC.2017.2660298
10.1016/j.ins.2016.08.054
10.1109/TCYB.2019.2955543
10.1109/TCYB.2017.2787740
10.1016/j.ins.2018.04.016
10.1109/TAC.2004.831186
10.1109/TCYB.2017.2782731
10.1016/j.sysconle.2017.01.004
10.1109/TII.2019.2905295
10.1016/j.automatica.2015.01.021
10.1109/TCYB.2016.2570860
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
NPM
7SC
7SP
7TB
8FD
F28
FR3
H8D
JQ2
L7M
L~C
L~D
7X8
DOI 10.1109/TCYB.2020.3005354
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
PubMed
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Aerospace Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
MEDLINE - Academic
DatabaseTitle CrossRef
PubMed
Aerospace Database
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
MEDLINE - Academic
DatabaseTitleList PubMed
Aerospace Database
MEDLINE - Academic

Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 2168-2275
EndPage 2031
ExternalDocumentID 32697735
10_1109_TCYB_2020_3005354
9146361
Genre orig-research
Journal Article
GrantInformation_xml – fundername: LiaoNing Revitalization Talents Program
  grantid: XLYC19070354
  funderid: 10.13039/501100018617
– fundername: Fundamental Research Funds for the Central Universities
  grantid: N2004027
  funderid: 10.13039/501100012226
– fundername: National Natural Science Foundation of China
  grantid: 61773097; U1813214
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
RIG
NPM
7SC
7SP
7TB
8FD
F28
FR3
H8D
JQ2
L7M
L~C
L~D
7X8
ID FETCH-LOGICAL-c349t-496342f32e57ff6872e758d8a31b6db409e5f5305590dba0b1245599bb61860f3
IEDL.DBID RIE
ISSN 2168-2267
2168-2275
IngestDate Fri Jul 11 09:43:13 EDT 2025
Mon Jun 30 04:34:55 EDT 2025
Thu Jan 02 22:55:22 EST 2025
Tue Jul 01 00:53:56 EDT 2025
Thu Apr 24 22:58:43 EDT 2025
Wed Aug 27 02:40:50 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c349t-496342f32e57ff6872e758d8a31b6db409e5f5305590dba0b1245599bb61860f3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-5725-8956
0000-0001-8002-507X
PMID 32697735
PQID 2647423887
PQPubID 85422
PageCount 14
ParticipantIDs crossref_citationtrail_10_1109_TCYB_2020_3005354
pubmed_primary_32697735
proquest_miscellaneous_2426535820
proquest_journals_2647423887
crossref_primary_10_1109_TCYB_2020_3005354
ieee_primary_9146361
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-04-01
PublicationDateYYYYMMDD 2022-04-01
PublicationDate_xml – month: 04
  year: 2022
  text: 2022-04-01
  day: 01
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
– name: Piscataway
PublicationTitle IEEE transactions on cybernetics
PublicationTitleAbbrev TCYB
PublicationTitleAlternate IEEE Trans Cybern
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref9
  doi: 10.1109/TAC.2013.2266831
– ident: ref25
  doi: 10.1109/TAC.2019.2936555
– ident: ref7
  doi: 10.1016/j.automatica.2019.108557
– ident: ref3
  doi: 10.1109/TCYB.2017.2708321
– ident: ref22
  doi: 10.1016/j.automatica.2019.04.013
– ident: ref14
  doi: 10.1002/rnc.3342
– ident: ref33
  doi: 10.1109/TCYB.2019.2925123
– ident: ref6
  doi: 10.1016/j.automatica.2014.10.067
– ident: ref8
  doi: 10.1109/TCST.2013.2280899
– ident: ref21
  doi: 10.1002/rnc.4328
– ident: ref30
  doi: 10.1137/1.9781611971446
– ident: ref11
  doi: 10.1109/TCYB.2019.2915124
– ident: ref5
  doi: 10.1016/j.automatica.2019.01.013
– ident: ref12
  doi: 10.1109/TSMC.2019.2905253
– ident: ref16
  doi: 10.1002/rnc.2997
– ident: ref28
  doi: 10.1007/978-94-015-7793-9
– ident: ref13
  doi: 10.1109/TAC.2015.2416924
– ident: ref10
  doi: 10.1109/TSMC.2016.2616544
– ident: ref27
  doi: 10.1109/TII.2018.2817248
– ident: ref20
  doi: 10.1109/TAC.2011.2179869
– ident: ref19
  doi: 10.1137/060675861
– ident: ref31
  doi: 10.1016/0024-3795(92)90016-4
– ident: ref32
  doi: 10.1109/TAC.2017.2660298
– ident: ref17
  doi: 10.1016/j.ins.2016.08.054
– ident: ref24
  doi: 10.1109/TCYB.2019.2955543
– ident: ref15
  doi: 10.1109/TCYB.2017.2787740
– ident: ref26
  doi: 10.1016/j.ins.2018.04.016
– ident: ref29
  doi: 10.1109/TAC.2004.831186
– ident: ref4
  doi: 10.1109/TCYB.2017.2782731
– ident: ref18
  doi: 10.1016/j.sysconle.2017.01.004
– ident: ref1
  doi: 10.1109/TII.2019.2905295
– ident: ref23
  doi: 10.1016/j.automatica.2015.01.021
– ident: ref2
  doi: 10.1109/TCYB.2016.2570860
SSID ssj0000816898
Score 2.5929632
Snippet This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS...
SourceID proquest
pubmed
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 2018
SubjectTerms Algorithms
Connectivity
Decentralized control
Defense strategy
Denial of service attacks
denial-of-service (DoS) attacks
Denial-of-service attack
fixed-time control
Multi-agent systems
Multiagent systems
Network topology
nonlinear multiagent systems (MASs)
Nonlinear systems
Observers
Stability analysis
Switches
Topology
Tracking
Transient analysis
Transient performance
Title Observer-Based Fixed-Time Secure Tracking Consensus for Networked High-Order Multiagent Systems Against DoS Attacks
URI https://ieeexplore.ieee.org/document/9146361
https://www.ncbi.nlm.nih.gov/pubmed/32697735
https://www.proquest.com/docview/2647423887
https://www.proquest.com/docview/2426535820
Volume 52
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NbxMxEB2VnnoB2vKxUCpX4kArnDr2bhIf00JUIbU9tJXKabW2x6gCJajZSIhfz4zX2UoIELeV4t18zDjzZjzvDcDbgBZ9NEZOojeSIp6WtlRRTrCMMYSqNIbZyOcXo7Ob8tNtdbsB73suDCKm5jMc8GU6yw8Lv-JS2bEdsrwV5TqPKHHruFp9PSUNkEijbzVdSEIV43yIOVT2-Pr08wklg5py1KRowuN4CLgQ-Elz3h4iUhqx8ne0maLO7Amcrz9v12zydbBq3cD__E3K8X-_0FN4nOGnmHb-sg0bON-B7bzBl-JdVqE-3IXlpeOCLd7LEwp0QczufmCQzBgRqUaPgsKc50K74KGfPDFjKQgBi4uusZxu4R4SecnaniLxfBumcYmskS6mX5o7wqbiw-JKTNuWuf7P4Gb28fr0TOYJDdKb0raypO1b6mg0VuMYR5OxRso_wqQxQzcKjnJHrGLFomJWBdcoR2iCJc6cY5l-Fc1z2Jwv5vgShIpaDyPhT00_SjUOVkcWR6OHGqu8jwWotZVqn-XLeYrGtzqlMcrWbOOabVxnGxdw1N_yvdPu-NfiXbZPvzCbpoC9tSvUeXcvawKRfMBN_88FHPQv077kw5ZmjosVrSHoUzENWRXwonOh_tlrz3v15_d8DVuaSRapP2gPNtv7Fb4h6NO6_eTzvwBa8PrU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEB5V5QAXSikPtwUWiQMgNl3v2kn2mBaiAE16IJXKyfK-UNUqqRpHQvx6ZtYbIyFA3Cxl7TxmNvPN7Mz3AbxyXnsblOLDYBXHiCe5LkTgQ1-E4FxZKEXTyNNZf3JefLooL7bgXTcL472PzWe-R5fxLN8t7ZpKZUc6J3orzHXuYNwv83Zaq6uoRAmJKH4r8YIjrhikY8xc6KP5yddjTAclZqmR04QEeRC6IPyJSm-_YlIUWfk73oxxZ7wD080nbttNrnrrxvTsj9_IHP_3Kz2A-wmAslHrMbuw5RcPYTdt8RV7nXio3-zB6sxQydbf8mMMdY6NL797x2lmhMUqvWcY6CyV2hnJfpJmxoohBmaztrUcb6EuEn5G7J4sTvrWNMjFEks6G32rLxGdsvfLL2zUNDTt_wjOxx_mJxOeNBq4VYVueIEbuJBBSV8OQugPB9JjBuKGtcpN3xnMHn0ZSqIV08KZWhjEE0RyZgwR9YugHsP2YrnwT4GJIGUeEIFK_FHKgdMyED0aPlRpYW3IQGysVNlEYE46GtdVTGSErsjGFdm4SjbO4G13y03L3vGvxXtkn25hMk0GhxtXqNL-XlUII-mIG_-hM3jZvYw7k45b6oVfrnENgp-SBpFFBk9aF-qevfG8_T-_5wu4O5lPT6vTj7PPB3BP0shF7BY6hO3mdu2fIRBqzPPo_z8BmJH-HQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Observer-Based+Fixed-Time+Secure+Tracking+Consensus+for+Networked+High-Order+Multiagent+Systems+Against+DoS+Attacks&rft.jtitle=IEEE+transactions+on+cybernetics&rft.au=Yang%2C+Haijiao&rft.au=Ye%2C+Dan&rft.date=2022-04-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=2168-2267&rft.eissn=2168-2275&rft.volume=52&rft.issue=4&rft.spage=2018&rft_id=info:doi/10.1109%2FTCYB.2020.3005354&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2267&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2267&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2267&client=summon