A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 197

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1075
Function: getPubMedXML

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3195
Function: GetPubMedArticleOutput_2016

File: /var/www/html/application/controllers/Detail.php
Line: 597
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 511
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 317
Function: require_once

Secure Finite-Horizon Consensus Control of Multiagent Systems Against Cyber Attacks. | LitMetric

Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

The problem of secure finite-horizon consensus control for discrete time-varying multiagent systems (MASs) with actuator saturation and cyber attacks is addressed in this article. A random attack model is first proposed to account for randomly occurring false data injection attacks and denial-of-service attacks, whose dynamics are governed by the random Markov process. The hybrid secure control scheme is developed to mitigate the influence of arbitrary cyber attacks on system performance. Specifically, this article proposes a hybrid control law containing multiple controllers, each of which is designed to counter different types of cyber attacks. By using the stochastic analysis approach, two sufficient criteria are provided to guarantee that the time-varying MASs satisfy the finite horizon H consensus performance. Then, the controller parameters are obtained by solving the recursive linear matrix inequality. The usefulness of the theoretic results presented is demonstrated via a numerical example that contains a performance comparison of different secure control schemes.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2021.3052467DOI Listing

Publication Analysis

Top Keywords

cyber attacks
16
secure finite-horizon
8
finite-horizon consensus
8
consensus control
8
multiagent systems
8
secure control
8
attacks
6
control
5
secure
4
control multiagent
4

Similar Publications