Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/26028
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xu, W | - |
dc.contributor.author | Wang, Z | - |
dc.contributor.author | Hu, L | - |
dc.contributor.author | Kurths, J | - |
dc.date.accessioned | 2023-03-01T16:02:34Z | - |
dc.date.available | 2021-11-26 | - |
dc.date.available | 2023-03-01T16:02:34Z | - |
dc.date.issued | 2021-11-26 | - |
dc.identifier | ORCID iDs: Wenying XU https://orcid.org/0000-0002-6110-9160; Zidong Wang https://orcid.org/0000-0002-9576-7401; Liang Hu https://orcid.org/0000-0002-9635-4297; Jürgen Kurths https://orcid.org/0000-0002-5926-4276. | - |
dc.identifier.citation | Xu, W. et al. (2022) 'State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity', IEEE Transactions on Automatic Control, 67 (12), pp. 6745 - 6753. doi: 10.1109/TAC.2021.3131145. | en_US |
dc.identifier.issn | 0018-9286 | - |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/26028 | - |
dc.description.sponsorship | 10.13039/501100004608-Natural Science Foundation of Jiangsu Province (Grant Number: BK20180367); 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 62173087, 61933007, 61873148 and 61803082); 10.13039/501100012226-Fundamental Research Funds for the Central Universities; ZhiShan Youth Scholar Program from Southeast University of China; Alexander von Humboldt Foundation of Germany; Russian Ministry of Science and Education (Grant Number: 075-15-2020-808). | en_US |
dc.format.extent | 6745 - 6753 | - |
dc.format.medium | Print-Electronic | - |
dc.language | Engish | - |
dc.language.iso | en_US | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.rights | Copyright © 2021 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works by sending a request to pubs-permissions@ieee.org. See: https://www.ieee.org/publications/rights/rights-policies.html | - |
dc.rights.uri | https://www.ieee.org/publications/rights/rights-policies.html | - |
dc.subject | false data injection attack | en_US |
dc.subject | security | en_US |
dc.subject | joint attacks | en_US |
dc.subject | state estimation | en_US |
dc.subject | resource constraints | en_US |
dc.title | State Estimation Under Joint False Data Injection Attacks: Dealing With Constraints and Insecurity | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.1109/TAC.2021.3131145 | - |
dc.relation.isPartOf | IEEE Transactions on Automatic Control | - |
pubs.issue | 12 | - |
pubs.publication-status | Published | - |
pubs.volume | 67 | - |
dc.identifier.eissn | 1558-2523 | - |
dc.rights.holder | Institute of Electrical and Electronics Engineers (IEEE) | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2021 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works by sending a request to pubs-permissions@ieee.org. See: https://www.ieee.org/publications/rights/rights-policies.html | 474.68 kB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.