{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:13:11Z","timestamp":1761581591432,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063633"},{"type":"electronic","value":"9789811063640"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6364-0_48","type":"book-chapter","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T01:22:33Z","timestamp":1503537753000},"page":"477-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["H \u221e Prediction Triggering Control of Multi-area Power Systems Load Frequency Control Under DoS Attacks"],"prefix":"10.1007","author":[{"given":"Zihao","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Dong","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Xinli","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Chongxin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Songlin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"issue":"11","key":"48_CR1","doi-asserted-by":"publisher","first-page":"2930","DOI":"10.1109\/TAC.2015.2416924","volume":"60","author":"C De Persis","year":"2015","unstructured":"De Persis, C., Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 60(11), 2930\u20132944 (2015)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"5","key":"48_CR2","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1109\/TII.2016.2542208","volume":"12","author":"Y Yuan","year":"2016","unstructured":"Yuan, Y., Yuan, H., Guo, L., Yang, H., Sun, S.: Resilient control of networked control system under DoS attacks: a unified game approach. IEEE Trans. Ind. Inf. 12(5), 1786\u20131794 (2016)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"15","key":"48_CR3","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1049\/iet-cta.2016.0135","volume":"10","author":"D Ding","year":"2016","unstructured":"Ding, D., Wang, Z., Wei, G.: Event-based security control for discrete-time stochastic systems. IET Control Theory Appl. 10(15), 1808\u20131815 (2016)","journal-title":"IET Control Theory Appl."},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, J., Peng, C., Masroor, S., Sun, H., Chai, L.: Stability analysis of networked control systems with denial-of-service attacks. In: 2016 UKACC 11th International Conference on Control, Belfast, pp. 1\u20136 (2016)","DOI":"10.1109\/CONTROL.2016.7737622"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"Hu, L., Wang, Z., Naeem, W.: Security analysis of stochastic networked control systems under false data injection attacks. In: 2016 UKACC 11th International Conference on Control, Belfast, pp. 1\u20136 (2016)","DOI":"10.1109\/CONTROL.2016.7737519"},{"key":"48_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","volume-title":"Hybrid Systems: Computation and Control","author":"S Amin","year":"2009","unstructured":"Amin, S., C\u00e1rdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31\u201345. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-00602-9_3"},{"issue":"11","key":"48_CR7","doi-asserted-by":"publisher","first-page":"3023","DOI":"10.1109\/TAC.2015.2409905","volume":"60","author":"H Zhang","year":"2015","unstructured":"Zhang, H., Cheng, P.: Optimal denial-of-service attack scheduling with energy constraint. IEEE Trans. Autom. Control 60(11), 3023\u20133028 (2015)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"3","key":"48_CR8","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TCST.2015.2462741","volume":"24","author":"H Zhang","year":"2016","unstructured":"Zhang, H., Cheng, P., Shi, L., Chen, J.: Optimal DoS attack scheduling in wireless networked control system. IEEE Trans. Control Syst. Technol. 24(3), 843\u2013852 (2016)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Amullen, E.M., Shetty, S., Keel, L.H.: Secured formation control for multi-agent systems under DoS attacks. In: 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, pp. 1\u20136 (2016)","DOI":"10.1109\/THS.2016.7568947"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.enconman.2007.06.021","volume":"49","author":"H Bevrani","year":"2008","unstructured":"Bevrani, H., Hiyama, T.: Robust decentralized PI based LFC design for time-delay power system. Energy Convers. Manag. 49, 193\u2013204 (2008)","journal-title":"Energy Convers. Manag."},{"issue":"1","key":"48_CR11","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TPWRS.2008.2004733","volume":"24","author":"D Dotta","year":"2009","unstructured":"Dotta, D., Silva, A.S.: Wide-area measurements-based two\u2013level control design considering signal transmission delay. IEEE Trans. Power Syst. 24(1), 208\u2013216 (2009)","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"48_CR12","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1016\/j.ijepes.2012.03.035","volume":"42","author":"R Dey","year":"2012","unstructured":"Dey, R., Ghosh, S., Ray, G.: H\n          \u221e load frequency control of interconnected power systems with communication delays. Int. J. Electr. Power Energy Syst. 42(1), 672\u2013684 (2012)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"48_CR13","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.ijepes.2014.03.020","volume":"61","author":"M Shiroei","year":"2014","unstructured":"Shiroei, M.: Supervisory predictive control of power system load frequency control. Int. J. Electr. Power Energy Syst. 61, 70\u201380 (2014)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"6","key":"48_CR14","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1109\/TCSII.2010.2048377","volume":"57","author":"GP Liu","year":"2010","unstructured":"Liu, G.P.: Predictive controller design of networked systems with communication delays and data loss. IEEE Trans. Circuits Syst. II Express Briefs 57(6), 481\u2013485 (2010)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"2","key":"48_CR15","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1137\/130950951","volume":"54","author":"X Yin","year":"2016","unstructured":"Yin, X., Yue, D., Songlin, H., Peng, C., Xue, Y.: Model-based event-triggered predictive control for networked systems with data dropout. SIAM J. Control Optim. 54(2), 567\u2013586 (2016)","journal-title":"SIAM J. Control Optim."},{"key":"48_CR16","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1002\/rnc.3281","volume":"25","author":"X Yin","year":"2015","unstructured":"Yin, X., Yue, D., Hu, S.: Model-based event-triggered predictive control for networked systems with communication delays compensation. Int. J. Robust Nonlinear Control 25, 3572\u20133595 (2015)","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"48_CR17","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.isatra.2011.09.002","volume":"51","author":"S Hu","year":"2012","unstructured":"Hu, S., Yue, D.: Event-triggered control design of linear networked systems with quantizations. ISA Trans. 51, 153\u2013162 (2012)","journal-title":"ISA Trans."},{"issue":"2013","key":"48_CR18","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TAC.2012.2206694","volume":"58","author":"D Yue","year":"2013","unstructured":"Yue, D., Tian, E., Han, Q.: A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 58(2013), 475\u2013481 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2013","key":"48_CR19","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1109\/TAC.2012.2211411","volume":"58","author":"E Garcia","year":"2013","unstructured":"Garcia, E., Antsaklis, P.: Model-based event-triggered control for systems with quantization and time-varying network delays. IEEE Trans. Autom. Control 58(2013), 422\u2013434 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2013","key":"48_CR20","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/j.automatica.2012.11.025","volume":"49","author":"W Heemels","year":"2013","unstructured":"Heemels, W., Donkers, M.: Model-based periodic event-triggered control for linear systems. Autom. J. IFAC 49(2013), 698\u2013711 (2013)","journal-title":"Autom. J. IFAC"},{"issue":"99","key":"48_CR21","first-page":"1","volume":"PP","author":"C Peng","year":"2016","unstructured":"Peng, C., Li, J., Fei, M.R.: Resilient event-triggered H\u221e load frequency control for networked power systems with energy-limited DoS attacks. IEEE Trans. Power Syst. PP(99), 1 (2016)","journal-title":"IEEE Trans. Power Syst."}],"container-title":["Communications in Computer and Information Science","Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6364-0_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:55:37Z","timestamp":1710352537000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-10-6364-0_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063633","9789811063640"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6364-0_48","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"25 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing for Sustainable Energy and Environment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsee2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.lsms-icsee.shu.edu.cn\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}