Necessary and Sufficient Conditions for Security of Hidden Markov Boolean Control Networks Under Shifting Attacks.
Liqing WangZheng-Guang WuJames LamPublished in: IEEE Trans. Netw. Sci. Eng. (2023)
Keyphrases
- sufficient conditions
- security threats
- lyapunov function
- security mechanisms
- security protocols
- asymptotic stability
- access control
- security vulnerabilities
- cyber attacks
- information security
- equilibrium point
- robust stability
- linear complementarity problem
- control system
- exponential stability
- countermeasures
- real time control
- linear matrix inequality
- computer networks
- optimal policy
- security issues
- control method
- control theory
- control algorithm
- network security
- efficiently computable
- neural network
- asymptotic optimality
- control strategy
- adaptive control