SCIENCE CHINA Information Sciences, Volume 64 , Issue 2 : 129203(2021) https://doi.org/10.1007/s11432-018-9583-2

Stability of networked control system subject to denial-of-service

More info
  • ReceivedJun 29, 2018
  • AcceptedAug 20, 2018
  • PublishedApr 24, 2020


There is no abstract available for this article.


This work was supported by National Natural Science Foundation of China (Grant Nos. 61573036, 61174057).


Appendixes A–E.


[1] Corona I, Giacinto G, Roli F. Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues. Inf Sci, 2013, 239: 201-225 CrossRef Google Scholar

[2] Teixeira A, Shames I, Sandberg H. A secure control framework for resource-limited adversaries. Automatica, 2015, 51: 135-148 CrossRef Google Scholar

[3] Huda S, Miah S, Mehedi Hassan M. Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inf Sci, 2017, 379: 211-228 CrossRef Google Scholar

[4] Tabuada P. Event-Triggered Real-Time Scheduling of Stabilizing Control Tasks. IEEE Trans Automat Contr, 2007, 52: 1680-1685 CrossRef Google Scholar

[5] Wu W, Reimann S, G?rges D. Event-triggered control for discrete-time linear systems subject to bounded disturbance. Int J Robust NOnlinear Control, 2016, 26: 1902-1918 CrossRef Google Scholar

[6] Yu H, Hao F. Input-to-state stability of integral-based event-triggered control for linear plants. Automatica, 2017, 85: 248-255 CrossRef Google Scholar

[7] Hu S, Yan W Y. Stability robustness of networked control systems with respect to packet loss. Automatica, 2007, 43: 1243-1248 CrossRef Google Scholar

[8] Zhu Q, Hu G D, Zeng L. Mean-square Exponential Input-to-state Stability of Euler-Maruyama Method Applied to Stochastic Control Systems. Acta Automatica Sin, 2010, 36: 406-411 CrossRef Google Scholar