{"id":"https://openalex.org/W4400944067","doi":"https://doi.org/10.1109/tcns.2024.3432951","title":"Resilient Event-Triggered Containment Control of Multiagent Systems Under Asynchronous DoS Attacks and Disturbances","display_name":"Resilient Event-Triggered Containment Control of Multiagent Systems Under Asynchronous DoS Attacks and Disturbances","publication_year":2024,"publication_date":"2024-07-24","ids":{"openalex":"https://openalex.org/W4400944067","doi":"https://doi.org/10.1109/tcns.2024.3432951"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2024.3432951","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2024.3432951","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062020974","display_name":"Mohammad Ali Mousavian","orcid":null},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Mousavian","raw_affiliation_strings":["Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015358236","display_name":"Hajar Atrianfar","orcid":"https://orcid.org/0000-0002-7407-7233"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hajar Atrianfar","raw_affiliation_strings":["Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062020974"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":5.0624,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95772152,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"12","issue":"1","first_page":"85","last_page":"95"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9602000117301941,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9563000202178955,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/containment","display_name":"Containment (computer programming)","score":0.7689609527587891},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6908469200134277},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.6348778605461121},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4949943423271179},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4881041944026947},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.45152419805526733},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4334556460380554},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4009784162044525},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30910903215408325},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.19100505113601685},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08270895481109619}],"concepts":[{"id":"https://openalex.org/C2777019822","wikidata":"https://www.wikidata.org/wiki/Q390066","display_name":"Containment (computer programming)","level":2,"score":0.7689609527587891},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6908469200134277},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.6348778605461121},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4949943423271179},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4881041944026947},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.45152419805526733},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4334556460380554},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4009784162044525},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30910903215408325},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.19100505113601685},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08270895481109619},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcns.2024.3432951","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2024.3432951","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G1094934932","display_name":null,"funder_award_id":"4015920","funder_id":"https://openalex.org/F4320322243","funder_display_name":"Iran National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322243","display_name":"Iran National Science Foundation","ror":"https://ror.org/03sr1ma14"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1541034816","https://openalex.org/W2000806524","https://openalex.org/W2068740779","https://openalex.org/W2194554959","https://openalex.org/W2292430652","https://openalex.org/W2768779900","https://openalex.org/W2912784757","https://openalex.org/W3006442197","https://openalex.org/W3115892855","https://openalex.org/W3123693105","https://openalex.org/W3135890477","https://openalex.org/W3182915616","https://openalex.org/W3196711749","https://openalex.org/W3198914432","https://openalex.org/W3211306792","https://openalex.org/W3215739697","https://openalex.org/W4283387087","https://openalex.org/W4284701496"],"related_works":["https://openalex.org/W4252941105","https://openalex.org/W2116677773","https://openalex.org/W2058080364","https://openalex.org/W2350808199","https://openalex.org/W249480812","https://openalex.org/W3028091058","https://openalex.org/W4235551436","https://openalex.org/W2155261584","https://openalex.org/W2584231425","https://openalex.org/W2392382023"],"abstract_inverted_index":{"The":[0],"distributed":[1],"event-triggered":[2,27],"controller":[3],"is":[4,35,38,73,103,158,183],"proposed":[5,181],"for":[6,171],"the":[7,45,49,70,75,89,107,121,129,136,143,164,177,180],"containment":[8,28,153],"control":[9,29,46],"of":[10,17,92,109,128,135,140,152,179],"linear":[11],"multiagent":[12],"systems":[13],"under":[14,30,155],"asynchronous":[15,156],"denial":[16],"service":[18],"(DoS)":[19],"cyber-attacks":[20],"and":[21,33,48,68,138,148],"external":[22],"disturbances.":[23],"Using":[24,112,132],"disturbance":[25,34],"observer,":[26],"DoS":[31,55,71,141],"attacks":[32,42,56,157],"guaranteed.":[36],"It":[37],"assumed":[39],"that":[40],"separate":[41],"occurred":[43],"on":[44],"channels":[47],"communication":[50,66,110],"channels.":[51],"Moreover,":[52,163],"when":[53],"effective":[54],"occur,":[57],"it":[58],"becomes":[59],"impossible":[60],"to":[61,105,120],"communicate":[62],"data":[63,123],"through":[64],"a":[65,79],"network,":[67],"if":[69],"attack":[72],"ineffective,":[74],"topology":[76],"graph":[77],"has":[78],"united":[80],"directed":[81],"spanning":[82],"tree.":[83],"Our":[84],"method":[85,182],"does":[86],"not":[87],"require":[88],"continuous":[90,126],"sharing":[91],"state":[93,113],"information":[94,102,127],"between":[95],"neighboring":[96],"agents;":[97],"rather,":[98],"at":[99],"event":[100],"times,":[101],"sent":[104],"reduce":[106],"consumption":[108],"resources.":[111],"estimators,":[114],"trigger":[115],"times":[116],"are":[117,146],"determined":[118],"according":[119],"estimator's":[122],"without":[124],"any":[125],"neighbor's":[130],"state.":[131],"accurate":[133],"analysis":[134],"time":[137,170],"frequency":[139],"attacks,":[142],"resilient":[144],"conditions":[145],"obtained,":[147],"then,":[149],"exponential":[150],"stability":[151],"behavior":[154],"proved":[159],"by":[160,185],"Lyapunov":[161],"analysis.":[162],"obtained":[165],"strictly":[166],"positive":[167],"minimal":[168],"interevent":[169],"agents":[172],"prevents":[173],"Zeno":[174],"behavior.":[175],"Finally,":[176],"performance":[178],"shown":[184],"simulation.":[186]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
