作者: Ahmet Cetinkaya , Tomohisa Hayakawa , Hideaki Ishii
DOI:
关键词:
摘要: … , we describe the networked control problem under random and malicious packet losses. We … In Section IV, we look at the networked problem from the attacker’s perspective and provide …