A Game-Theoretic Approach of Cyberattack Resilient Constraint-Following Control for Cyber–physical Systems
Ad Hoc Networks(2023)
Key words
Cyber–physical system,Cyberattack,Constraint following,Mechanical system,Resilience
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined