Sign in
Networked Constrained Cyber-Physical Systems subject to malicious attacks: a resilient set-theoretic control approach.
Walter Lucia
Bruno Sinopoli
Giuseppe Franzè
Published in:
CoRR (2016)
Keyphrases
</>
cyber physical systems
set theoretic
malicious attacks
cyber physical
image recovery
physical world
cyber security
embedded systems
control system
artificial intelligence
social networks
fuzzy logic
unsupervised learning
social network analysis