1 |
Cyber-security of centralized, decentralized, and distributed control-detector architectures for nonlinear processes Chen S, Wu Z, Christofides PD Chemical Engineering Research & Design, 165, 25, 2021 |
2 |
Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption Murguia C, Farokhi F, Shames I IEEE Transactions on Automatic Control, 65(9), 3950, 2020 |
3 |
A secured distributed control system for future interconnected smart grids Saad AA, Faddel S, Mohammed O Applied Energy, 243, 57, 2019 |
4 |
A secured distributed control system for future interconnected smart grids Saad AA, Faddel S, Mohammed O Applied Energy, 243, 57, 2019 |
5 |
Deep learning aided interval state prediction for improving cyber security in energy internet Wang HZ, Ruan JQ, Ma ZW, Zhou B, Fu XQ, Cao GZ Energy, 174, 1292, 2019 |
6 |
Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations Su R Automatica, 94, 35, 2018 |
7 |
Resilient Randomized Quantized Consensus Dibaji SM, Ishii H, Tempo R IEEE Transactions on Automatic Control, 63(8), 2508, 2018 |
8 |
Safety integrity level verification for safety-related functions with security aspects Sliwiniski M Process Safety and Environmental Protection, 118, 79, 2018 |
9 |
THE EFFECT OF TIME-VARYING JAMMING INTERFERENCE ON NETWORKED STABILIZATION Cetinkaya A, Ishii H, Hayakawa T SIAM Journal on Control and Optimization, 56(3), 2398, 2018 |
10 |
Resilient consensus of second-order agent networks: Asynchronous update rules with delays Dibaji SM, Ishii H Automatica, 81, 123, 2017 |