The Citing articles tool gives a list of articles citing the current article. The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program . You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).
Cited article:
A. Bergeron
RAIRO-Theor. Inf. Appl., 27 6 (1993) 555-573
Published online: 2017-02-01
This article has been cited by the following article(s):
20 articles
Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control
Zhaoyang He, Naiqi Wu, Rong Su and Zhiwu Li IEEE/CAA Journal of Automatica Sinica 12 (3) 585 (2025) https://doi.org/10.1109/JAS.2024.124596
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers
Ruochen Tai, Liyong Lin and Rong Su IEEE Transactions on Automatic Control 69 (3) 1898 (2024) https://doi.org/10.1109/TAC.2023.3329341
Ruochen Tai, Liyong Lin and Rong Su 4462 (2024) https://doi.org/10.1109/CDC56724.2024.10886481
Synthesis of optimal covert sensor–actuator attackers for discrete-event systems
Ruochen Tai, Liyong Lin and Rong Su Automatica 151 110910 (2023) https://doi.org/10.1016/j.automatica.2023.110910
Ruochen Tai, Liyong Lin and Rong Su 7917 (2023) https://doi.org/10.1109/CDC49753.2023.10383903
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations
Ruochen Tai, Liyong Lin, Yuting Zhu and Rong Su IEEE Transactions on Automatic Control 68 (6) 3453 (2023) https://doi.org/10.1109/TAC.2022.3191393
Identification of System Vulnerability Under a Smart Sensor Attack via Attack Model Reduction
Ruochen Tai, Liyong Lin and Rong Su IEEE Control Systems Letters 6 2948 (2022) https://doi.org/10.1109/LCSYS.2022.3168735
Observation-assisted heuristic synthesis of covert attackers against unknown supervisors
Liyong Lin, Ruochen Tai, Yuting Zhu and Rong Su Discrete Event Dynamic Systems 32 (3) 495 (2022) https://doi.org/10.1007/s10626-021-00356-y
Liyong Lin, Ruochen Tai, Yuting Zhu and Rong Su 7003 (2021) https://doi.org/10.1109/CDC45484.2021.9683021
Synthesis of covert actuator and sensor attackers
Liyong Lin and Rong Su Automatica 130 109714 (2021) https://doi.org/10.1016/j.automatica.2021.109714
Synthesis of covert actuator attackers for free
Liyong Lin, Yuting Zhu and Rong Su Discrete Event Dynamic Systems 30 (4) 561 (2020) https://doi.org/10.1007/s10626-020-00312-2
Synthesis of Covert Actuator and Sensor Attackers as Supervisor Synthesis
Liyong Lin and Rong Su IFAC-PapersOnLine 53 (4) 1 (2020) https://doi.org/10.1016/j.ifacol.2021.04.047
Liyong Lin, Yuting Zhu and Rong Su 7659 (2019) https://doi.org/10.1109/CDC40024.2019.9030171
Yuting Zhu, Liyong Lin and Rong Su 1760 (2019) https://doi.org/10.23919/ECC.2019.8795844
Control of Nondeterministic Discrete Event Systems for Simulation Equivalence
Changyan Zhou and Ratnesh Kumar IEEE Transactions on Automation Science and Engineering 4 (3) 340 (2007) https://doi.org/10.1109/TASE.2006.891474
Control of Discrete-Event Systems with Partial Observations Using Coalgebra and Coinduction
Jan Komenda and Jan H. van Schuppen Discrete Event Dynamic Systems 15 (3) 257 (2005) https://doi.org/10.1007/s10626-005-2868-6
Mathematical Foundations of Computer Science 2003
Stéphane Riedweg and Sophie Pinchinat Lecture Notes in Computer Science, Mathematical Foundations of Computer Science 2003 2747 642 (2003) https://doi.org/10.1007/978-3-540-45138-9_58
Permissive strategies: from parity games to safety games
Julien Bernet, David Janin and Igor Walukiewicz RAIRO - Theoretical Informatics and Applications 36 (3) 261 (2002) https://doi.org/10.1051/ita:2002013
Nivat's processes and their synchronization
André Arnold Theoretical Computer Science 281 (1-2) 31 (2002) https://doi.org/10.1016/S0304-3975(02)00006-3
Sharing out control in distributed processes
Anne Bergeron Theoretical Computer Science 139 (1-2) 163 (1995) https://doi.org/10.1016/0304-3975(94)00132-3