References
Corona I, Giacinto G, Roli F. Adversarial attacks against intrusion detection systems: taxonomy, solutions and open issues. Inf Sci, 2013, 239: 201–225
Teixeira A, Shames I, Sandberg H, et al. A secure control framework for resource-limited adversaries. Automatica, 2015, 51: 135–148
Huda S, Miah S, Hassan M M, et al. Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data. Inf Sci, 2017, 379: 211–228
Tabuada P. Event-triggered real-time scheduling of stabilizing control tasks. IEEE Trans Autom Control, 2007, 52: 1680–1685
Wu W, Reimann S, Görges D, et al. Event-triggered control for discrete-time linear systems subject to bounded disturbance. Int J Robust Nonlinear Control, 2016, 26: 1902–1918
Yu H, Hao F. Input-to-state stability of integral-based event-triggered control for linear plants. Automatica, 2017, 85: 248–255
Hu S, Yan W Y. Stability robustness of networked control systems with respect to packet loss. Automatica, 2007, 43: 1243–1248
Zhu Q, Hu G D, Zeng L. Mean-square exponential input-to-state stability of euler-maruyama method applied to stochastic control systems. Acta Autom Sin, 2010, 36: 406–411
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61573036, 61174057).
Author information
Authors and Affiliations
Corresponding author
Supplementary File
Rights and permissions
About this article
Cite this article
Guo, L., Cui, T., Yu, H. et al. Stability of networked control system subject to denial-of-service. Sci. China Inf. Sci. 64, 129203 (2021). https://doi.org/10.1007/s11432-018-9583-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-018-9583-2