UM

Browse/Search Results:  1-5 of 5 Help

Selected(0)Clear Items/Page:    Sort:
Observer-Based Security Control for Nonlinear Suspension Systems With Cyber-Attacks and Hybrid-Triggered Scheme Journal article
Zhao, Jing, Jia, Junru, Li, Wenfeng, Zhang, Jinxi, Du, Haiping, Xie, Zhengchao, Wong, Pak Kin. Observer-Based Security Control for Nonlinear Suspension Systems With Cyber-Attacks and Hybrid-Triggered Scheme[J]. IEEE/ASME Transactions on Mechatronics, 2024, 1-12.
Authors:  Zhao, Jing;  Jia, Junru;  Li, Wenfeng;  Zhang, Jinxi;  Du, Haiping; et al.
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:6.1/6.2 | Submit date:2024/07/04
Attack Estimation  Hybrid Triggered Scheme  Security Control  Suspension Systems  Vibration Control  
Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks Journal article
Li, Sheng, Zou, Wencheng, Guo, Jian, Xiang, Zhengrong. Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks[J]. IEEE Systems Journal, 2022, 16(3), 4423-4432.
Authors:  Li, Sheng;  Zou, Wencheng;  Guo, Jian;  Xiang, Zhengrong
Favorite | TC[WOS]:24 TC[Scopus]:23  IF:4.0/3.9 | Submit date:2022/05/13
Actuators  Consensus Protocol  Cyber Attacks  Cyberattack  Denial-of-service Attack  Fault Tolerant Systems  Fault-tolerant Consensus  Multiagent Systems (Mas)  Security Control  Switched Systems  Switches  Topology  
The Interactions of Competition Law and Investment Law: The Case of Chinese State-Owned Enterprises and EU Merger Control Regime Book chapter
出自: Handbook of International Investment Law and Policy, Singapore:Springer, Singapore, 2019, 页码:1-21
Authors:  Svetlicinii, A.
Favorite | TC[Scopus]:0 | Submit date:2022/07/27
State-owned Enterprise  China  European Union  Merger Control  Foreign Direct Investment  National Security  Competition Law  Investment Law  
Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau Journal article
Brenda Wing Han Chan, Chi Tong Lei. Development and Validation of Project Management Constructs of Security Door Access Control Systems: A Pilot Study in Macau[J]. Nang Yan Business Journal, 2015, 4(1), 23-43.
Authors:  Brenda Wing Han Chan;  Chi Tong Lei
Favorite | TC[Scopus]:0 | Submit date:2019/10/24
Security Access Control System (Sacs)  Security Door Access Control System (Sdacs)  Result-oriented Management (Rom)  Project Management  
Internet of things' authentication and access control Journal article
Liu J., Xiao Y., Chen C.L.P.. Internet of things' authentication and access control[J]. International Journal of Security and Networks, 2012, 7(4), 228-241.
Authors:  Liu J.;  Xiao Y.;  Chen C.L.P.
Favorite | TC[Scopus]:32 | Submit date:2019/02/11
Access Control  Authentication  Iot  Rfid  Security