Bibliography

  1. J. Huang, D. W. C. Ho, F. Li, W. Yang, and Y. Tang, Secure remote state estimation against linear man-in-the-middle attacks using watermarking, Automatica, vol. 121, art. no. 109182, 2020.
  2. H. Lin, J. Lam, and Z. Wang, Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis, Information Sciences, vol. 546, pp. 943–960, 2021.
  3. J. Qin, M. Li, J. Wang, L. Shi, Y. Kang, and W. X. Zheng, Optimal denial-of-service attack energy management against state estimation over an SINR-based network, Automatica, vol. 119, art. no. 109090, 2020.
  4. H. Darvishi, D. Ciuonzo, E. R. Eide, and P. S. Rossi, Sensor-fault detection, isolation and accommodation for digital twins via modular data-driven architecture, ...

Get Multi-Sensor Filtering Fusion with Censored Data Under a Constrained Network Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.