Chrome Extension
WeChat Mini Program
Use on ChatGLM

A Game-Theoretic Approach of Cyberattack Resilient Constraint-Following Control for Cyber–physical Systems

Ad Hoc Networks(2023)

Cited 5|Views28
Key words
Cyber–physical system,Cyberattack,Constraint following,Mechanical system,Resilience
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined