0 | -- | 0 | Xiang Ma, Zhan Li. RETRACTED ARTICLE: Balanced scheduling method of network information resources for cloud storage |
545 | -- | 562 | Tengfei Zhang, Heng Wang 0002, Weiwei Che, Qing Li 0015. Adaptive event-triggered path following control for networked autonomous vehicles under aperiodic denial-of-service attacks |
563 | -- | 571 | Jun-Xiao Song, Jun-Wei Gao, Hai-Sheng Yu, Hua-Bo Liu. Quadratic stability of uncertain large-scale networked systems |
572 | -- | 589 | Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001. Unified optimality criteria for the Target-Attacker-Defender game |
590 | -- | 602 | K. Gnaneshwar, Vinay Kumar, Sudeep Sharma, Prabin Kumar Padhy. Non-parametric fractional-order controller design for stable process based on modified relay |
603 | -- | 613 | Rongsheng Xia, Han Jiang, Lei Su. Reinforcement learning based sliding mode control for two-time-scale multi-agent systems with malicious attacks |
614 | -- | 632 | S. Suganthi, T. Sree Kala. A novel secure aware privacy preserved data sharing framework in an E-government system based on a consortium blockchain |
633 | -- | 649 | Bandana Priya, M. Mubeen Tajudeen, M. Syed Ali 0001, Grienggrai Rajchakit, Ganesh Kumar Thakur. ∞ control of complex dynamical networks subject to stochastic cyber-attacks by new two-sided delay-dependent LKF functional |
650 | -- | 659 | Syed Ahmed Pasha, Rijha Safdar, Syed Taha Ali. False data injection attacks on networked control systems |
660 | -- | 668 | Xingyuan Yang, Xi Tong, Yangwang Fang. Robust control allocation method for uncertain systems based on the algorithms of maximum-minimum and improved fish swarm |
669 | -- | 677 | Ling Chen, MingChu Li. Equilibrium analysis for multi-defender Stackelberg security games under a logit tie-breaking rule |
678 | -- | 688 | Abdellaziz Binid, Toufik Ennouari, Bouchra Abouzaid. Stability of conformable fractional time-varying linear systems |
689 | -- | 706 | Amir Mohammad Aghazamani, Mahdi Khodabandeh. Fault-tolerant adaptive fractional order sliding mode control for a quadrotor using disturbance observer |
707 | -- | 729 | Ayorinde Bamimore. Application of gap metric for model selection in linear parameter varying model-based predictive control |
730 | -- | 745 | Samuel B, Kasturi K. A secure authentication and collaborative data-sharing model based on a blockchain network in the cloud |
746 | -- | 757 | Chandrababu Majjaru, K. Senthilkumar 0002. Secure intrusion detection system for IOT sensor data using LR-ECC and FY-SFL-DLNN algorithm |
758 | -- | 769 | Thiem V. Pham, Quynh T. Thanh Nguyen. Attack on communication links analysis and detection over the clustered networks |
770 | -- | 780 | Bao Jin, Chunxia Dou, Jiannan Chen, Victor Kuzin. Relative threshold event-triggered prescribed performance control for vehicle active suspension systems with uncertainty |
781 | -- | 788 | Zhenhua Wang, Yanli Zhu, Ben Niu. Consensus tracking for first-order agent dynamics with distributed delay |
789 | -- | 802 | Heng Kang, Minqing Xiao, Guisheng Zhai. 2 gain of nonlinear interconnected systems |
803 | -- | 824 | Kariyappa Janani, Sriramulu Ramamoorthy. PIoT-blockchain-enabled security framework for strengthening IoT device identity and data access |