ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
0
views
0
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,361
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Networked control systems under cyber attacks with applications to power networks
proceedings-article
Author(s):
Andre Teixeira
,
H Sandberg
,
K H Johansson
Publication date
(Print):
June 2010
Conference name:
2010 American Control Conference (ACC 2010)
Conference date:
July 30, 2010 - August 2, 2010
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electrospinning for biomedical applications
Author and article information
Conference
Publication date:
June 2010
Publication date (Print):
June 2010
Pages
: 3690-3696
Article
DOI:
10.1109/ACC.2010.5530638
SO-VID:
f364cbd6-87ff-47c9-9bb5-0d8573761c90
Copyright ©
© 2010
Conference name:
2010 American Control Conference (ACC 2010)
Conference location:
Baltimore, MD
Conference date:
July 30, 2010 - August 2, 2010
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,361
Resistance of geopolymer materials to acid attack
Authors:
T. Bakharev
Resistance of lignite bottom ash geopolymer mortar to sulfate and sulfuric acid attack
Authors:
Vanchai Sata
,
Apha Sathonsaowaphak
,
Prinya Chindaprasirt
Second‐order effects of CEO characteristics: How rivals' perceptions of CEOs as submissive and provocative precipitate competitive attacks
Authors:
Aaron Hill
,
Tessa Recendes
,
Jason Ridge
See all similar
Cited by
11
Distributed fault detection for interconnected second-order systems
Authors:
André M.H. Teixeira
,
Karl H. Johansson
,
Henrik Sandberg
…
Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks
Authors:
Derui Ding
,
Zidong Wang
,
Qing-Long Han
…
Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs
Authors:
Ahmad Taha
,
Junjian Qi
,
Jianhui Wang
…
See all cited by