作者: Liyong Lin , Rong Su
DOI: 10.1016/J.IFACOL.2021.04.047
关键词:
摘要: … , where the (partial-observation) attackers may or may not eavesdrop the control commands … covert attacker synthesis problem to the Ramadge-Wonham supervisor synthesis problem, …