{"id":"https://openalex.org/W7148895114","doi":"https://doi.org/10.1134/s0005117925600909","title":"A Robust Fault-Tolerant Control Considering Packet Dropout and Denial of Service Attack","display_name":"A Robust Fault-Tolerant Control Considering Packet Dropout and Denial of Service Attack","publication_year":2025,"publication_date":"2025-04-01","ids":{"openalex":"https://openalex.org/W7148895114","doi":"https://doi.org/10.1134/s0005117925600909"},"language":"en","primary_location":{"id":"doi:10.1134/s0005117925600909","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0005117925600909","pdf_url":null,"source":{"id":"https://openalex.org/S134188425","display_name":"Automation and Remote Control","issn_l":"0005-1179","issn":["0005-1179","1608-3032"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automation and Remote Control","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101315104","display_name":"Hyok-Chol Ju","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hyok-Chol Ju","raw_affiliation_strings":["Faculty of Electronics and Automation, Kim Il Sung University, Pyongyang, Democratic People\u2019s Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics and Automation, Kim Il Sung University, Pyongyang, Democratic People\u2019s Republic of Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132886700","display_name":"Yong-Il Kim","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yong-Il Kim","raw_affiliation_strings":["Faculty of Electronics and Automation, Kim Il Sung University, Pyongyang, Democratic People\u2019s Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics and Automation, Kim Il Sung University, Pyongyang, Democratic People\u2019s Republic of Korea","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5094110518","display_name":"Kuk-Chol Ri","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kuk-Chol Ri","raw_affiliation_strings":["Faculty of Electronics and Automation, Kim Il Sung University, Pyongyang, Democratic People\u2019s Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronics and Automation, Kim Il Sung University, Pyongyang, Democratic People\u2019s Republic of Korea","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101315104"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.73580453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"86","issue":"1-4","first_page":"30","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.4523000121116638,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.4523000121116638,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.30250000953674316,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.08389999717473984,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7889999747276306},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.7404000163078308},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6963000297546387},{"id":"https://openalex.org/keywords/dropout","display_name":"Dropout (neural networks)","score":0.6639000177383423},{"id":"https://openalex.org/keywords/robust-control","display_name":"Robust control","score":0.6029000282287598},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.532800018787384},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.531000018119812},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4925999939441681},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.4499000012874603},{"id":"https://openalex.org/keywords/networked-control-system","display_name":"Networked control system","score":0.4377000033855438}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7889999747276306},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.7404000163078308},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6963000297546387},{"id":"https://openalex.org/C2776145597","wikidata":"https://www.wikidata.org/wiki/Q25339462","display_name":"Dropout (neural networks)","level":2,"score":0.6639000177383423},{"id":"https://openalex.org/C31531917","wikidata":"https://www.wikidata.org/wiki/Q915157","display_name":"Robust control","level":3,"score":0.6029000282287598},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5471000075340271},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.532800018787384},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.531000018119812},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4925999939441681},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.4499000012874603},{"id":"https://openalex.org/C1759631","wikidata":"https://www.wikidata.org/wiki/Q9336345","display_name":"Networked control system","level":3,"score":0.4377000033855438},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4171999990940094},{"id":"https://openalex.org/C201829737","wikidata":"https://www.wikidata.org/wiki/Q2022760","display_name":"Linear matrix inequality","level":2,"score":0.3903999924659729},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.3813000023365021},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.3765000104904175},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3619000017642975},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.35350000858306885},{"id":"https://openalex.org/C6802819","wikidata":"https://www.wikidata.org/wiki/Q1072174","display_name":"Linear system","level":2,"score":0.3497999906539917},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.33629998564720154},{"id":"https://openalex.org/C55689738","wikidata":"https://www.wikidata.org/wiki/Q15963867","display_name":"Discrete time and continuous time","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.29739999771118164},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.29420000314712524},{"id":"https://openalex.org/C143170015","wikidata":"https://www.wikidata.org/wiki/Q17007850","display_name":"Stability conditions","level":3,"score":0.2849999964237213},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.2815999984741211},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C204322392","wikidata":"https://www.wikidata.org/wiki/Q925922","display_name":"Full state feedback","level":3,"score":0.2750999927520752},{"id":"https://openalex.org/C107645828","wikidata":"https://www.wikidata.org/wiki/Q12070446","display_name":"System model","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.2639999985694885}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1134/s0005117925600909","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0005117925600909","pdf_url":null,"source":{"id":"https://openalex.org/S134188425","display_name":"Automation and Remote Control","issn_l":"0005-1179","issn":["0005-1179","1608-3032"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automation and Remote Control","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2006187520","https://openalex.org/W2290356246","https://openalex.org/W2594278774","https://openalex.org/W2737797365","https://openalex.org/W2800244387","https://openalex.org/W2898559182","https://openalex.org/W2912260846","https://openalex.org/W3185105532","https://openalex.org/W4255184210","https://openalex.org/W4313641248","https://openalex.org/W4362632616","https://openalex.org/W4406425615"],"related_works":[],"abstract_inverted_index":{"In":[0,42,190],"this":[1,43,79],"paper,":[2,44],"we":[3,45,85],"study":[4],"a":[5,51,66,87,130,134,191],"robust":[6,52,67,116,131,172],"fault-tolerant":[7,53,68,117,132,174],"controller":[8,27,54,143,175],"design":[9,65],"method":[10],"in":[11,29,58,97],"networked":[12,192],"control":[13,39,69,193],"system":[14,40],"(NCS),":[15],"with":[16,55,60,94],"denial":[17],"of":[18,25,32,50,78,89,115,123,155,161,170,207],"service":[19],"(DoS)":[20],"attack":[21],"on":[22],"both":[23],"sides":[24],"the":[26,30,38,47,98,112,121,124,149,153,168,205,208],"and":[28,34,64,106,110,158,164,181,203],"presence":[31],"faults":[33,63,105,154],"packet":[35,95],"dropouts":[36],"at":[37],"nodes.":[41],"present":[46,111],"existence":[48,113],"condition":[49,114],"state":[56],"feedback":[57],"NCS":[59,93,100],"passive":[61,103,156],"component":[62,104],"algorithm":[70],"from":[71,120],"Lyapunov\u2019s":[72],"stability":[73,206],"theory.":[74],"The":[75,140],"main":[76],"contributions":[77],"paper":[80],"are":[81],"as":[82],"follows.":[83],"First,":[84],"develop":[86],"model":[88,101,122],"extended":[90,125],"linear":[91,126],"discrete":[92,127],"dropout":[96],"uncertain":[99],"where":[102],"DoS":[107],"attacks":[108],"exist,":[109],"controller.":[118],"Second,":[119],"uncertainty":[128],"NCS,":[129],"controller,":[133,136],"security":[135,142],"have":[137],"been":[138],"designed.":[139],"proposed":[141],"does":[144],"not":[145],"need":[146],"to":[147,199],"estimate":[148],"threshold":[150],"value":[151],"for":[152,184],"components":[157],"is":[159,176],"independent":[160],"fault":[162],"detection":[163],"diagnosis":[165],"devices.":[166],"Finally,":[167],"effectiveness":[169],"designed":[171],"optimal":[173],"demonstrated":[177],"through":[178],"numerical":[179],"simulations":[180],"application":[182],"experiments":[183],"quadrotor":[185],"unmanned":[186],"aerial":[187],"vehicle":[188],"(UAV).":[189],"system,":[194],"it":[195],"can":[196],"be":[197],"used":[198],"protect":[200],"network":[201],"resources":[202],"verify":[204],"system.":[209]},"counts_by_year":[],"updated_date":"2026-04-05T06:14:27.290980","created_date":"2026-04-04T00:00:00"}
