Henrik Sandberg
#160,442
Most Influential Person Now
Researcher ORCID ID = 0000-0003-1835-2963
Henrik Sandberg's AcademicInfluence.com Rankings
Henrik Sandbergengineering Degrees
Engineering
#6887
World Rank
#8240
Historical Rank
Electrical Engineering
#2102
World Rank
#2207
Historical Rank
Applied Physics
#2288
World Rank
#2327
Historical Rank

Download Badge
Engineering
Why Is Henrik Sandberg Influential?
(Suggest an Edit or Addition)Henrik Sandberg's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A secure control framework for resource-limited adversaries (2012) (791)
- A Survey of Distributed Optimization and Control Algorithms for Electric Power Systems (2017) (723)
- Cyber security analysis of state estimators in electric power systems (2010) (393)
- Stealth Attacks and Protection Schemes for State Estimators in Power Systems (2010) (391)
- Attack models and scenarios for networked control systems (2012) (385)
- Distributed fault detection for interconnected second-order systems (2011) (363)
- On Security Indices for State Estimators in Power Networks (2010) (333)
- Limiting the Impact of Stealthy Attacks on Industrial Control Systems (2016) (280)
- Cyberphysical Security in Networked Control Systems: An Introduction to the Issue (2015) (252)
- Distributed Control of Networked Dynamical Systems: Static Feedback, Integral Action and Consensus (2013) (246)
- Scheduling smart home appliances using mixed integer linear programming (2011) (246)
- Revealing stealthy attacks in control systems (2012) (242)
- A Survey of Physics-Based Attack Detection in Cyber-Physical Systems (2018) (234)
- Secure Control Systems: A Quantitative Risk Management Approach (2015) (229)
- Networked control systems under cyber attacks with applications to power networks (2010) (227)
- Balanced truncation of linear time-varying systems (2004) (165)
- Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation (2012) (136)
- Distributed Fault Detection and Isolation Resilient to Network Model Uncertainties (2014) (131)
- A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator (2010) (125)
- Efficient Computations of a Security Index for False Data Attacks in Power Networks (2012) (113)
- On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem (2011) (112)
- Second-law-like inequalities with information and their interpretations (2014) (101)
- Distributed PI-control with applications to power systems frequency control (2013) (98)
- Distributed vs. centralized power systems frequency control (2013) (92)
- Multiple-Loop Self-Triggered Model Predictive Control for Network Scheduling and Control (2015) (83)
- Frequency-domain analysis of linear time-periodic systems (2005) (77)
- A Framework for Attack-Resilient Industrial Control Systems: Attack Detection and Controller Reconfiguration (2018) (77)
- The VIKING project: An initiative on resilient control of power networks (2009) (74)
- Electric power network security analysis via minimum cut relaxation (2011) (73)
- Distributed integral action: Stability analysis and frequency control of power systems (2012) (72)
- Design of State-Based Schedulers for a Network of Control Loops (2012) (65)
- Survey and New Directions for Physics-Based Attack Detection in Control Systems (2016) (62)
- Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures (2014) (61)
- A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems (2019) (61)
- Fisher Information as a Measure of Privacy: Preserving Privacy of Households With Smart Meters Using Batteries (2018) (61)
- Robust Scheduling of Smart Appliances in Active Apartments With User Behavior Uncertainty (2016) (58)
- Computing Critical $k$-Tuples in Power Networks (2012) (58)
- Network-layer protection schemes against stealth attacks on state estimators in power systems (2011) (51)
- Self-Triggered Model Predictive Control for Network Scheduling and Control (2012) (49)
- On the dual effect in state-based scheduling of networked control systems (2011) (48)
- Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements (2014) (48)
- Coherence in synchronizing power networks with distributed integral control (2017) (46)
- Voltage control for interconnected microgrids under adversarial actions (2015) (45)
- Challenges in Power System Information Security (2012) (44)
- Differentially private state estimation in distribution networks with smart meters (2015) (41)
- SDP-based joint sensor and controller design for information-regularized optimal LQG control (2015) (41)
- Clustering-Based Model Reduction of Networked Passive Systems (2016) (38)
- Demand response for aggregated residential consumers with energy storage sharing (2015) (38)
- Online fault diagnosis for nonlinear power systems (2015) (37)
- Maximum work extraction and implementation costs for nonequilibrium Maxwell's demons. (2014) (35)
- Toward Wireless Control in Industrial Process Automation: A Case Study at a Paper Mill (2019) (35)
- An Extension to Balanced Truncation With Application to Structured Model Reduction (2010) (35)
- Estimation over heterogeneous sensor networks (2008) (35)
- Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information (2018) (34)
- Active actuator fault detection and diagnostics in HVAC systems (2012) (34)
- Representing structure in linear interconnected dynamical systems (2010) (34)
- Directed information and privacy loss in cloud-based control (2017) (34)
- Optimal power flow: Closing the loop over corrupted data (2012) (33)
- Rate of prefix-free codes in LQG control systems (2016) (32)
- Optimal scaling of the ADMM algorithm for distributed quadratic programming (2013) (32)
- Retrofit control: Localization of controller design and implementation (2016) (31)
- Model Reduction of Interconnected Linear Systems Using Structured Gramians (2008) (31)
- Quadratic Gaussian privacy games (2015) (30)
- Mathematical relationships between representations of structure in linear interconnected dynamical systems (2011) (30)
- On Lossless Approximations, the Fluctuation- Dissipation Theorem, and Limitations of Measurements (2010) (30)
- Improving performance of droop-controlled microgrids through distributed PI-control (2016) (30)
- Agents misbehaving in a network: a vice or a virtue? (2012) (27)
- The ADMM Algorithm for Distributed Quadratic Problems: Parameter Selection and Constraint Preconditioning (2016) (27)
- Energy and CO2 efficient scheduling of smart home appliances (2013) (27)
- Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter (2017) (26)
- Distributed Controllers for Multiterminal HVDC Transmission Systems (2014) (26)
- Distributed Voltage and Current Control of Multi-Terminal High-Voltage Direct Current Transmission Systems (2013) (26)
- On the Coherence of Large-Scale Networks With Distributed PI and PD Control (2017) (26)
- Nonlinear state-dependent delay modeling and stability analysis of internet congestion control (2010) (25)
- Security analysis of control system anomaly detectors (2017) (25)
- A Bode sensitivity integral for linear time-periodic systems (2004) (25)
- Coherency-Independent Structured Model Reduction of Power Systems (2015) (25)
- Performance Analysis of a Network of Event-Based Systems (2014) (25)
- A graph-theoretic approach on optimizing informed-node selection in multi-agent tracking control (2014) (25)
- Finite-time thermodynamics of port-Hamiltonian systems (2013) (25)
- Cyber-security of SCADA systems (2012) (24)
- Predictive compensation for communication outages in networked control systems (2008) (23)
- Model approximation using magnitude and phase criteria: implications for model reduction and system identification (2007) (23)
- Detection and identification of data attacks in power system (2012) (23)
- Model reduction of linear systems using extended balanced truncation (2008) (22)
- Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems (2018) (22)
- Strategic stealthy attacks: The output-to-output ℓ2-gain (2015) (22)
- A case study in model reduction of linear time-varying systems (2004) (22)
- Cyber-Physical-Security Framework for Building Energy Management System (2016) (22)
- Optimal privacy-preserving policy using constrained additive noise to minimize the fisher information (2017) (21)
- From control system security indices to attack identifiability (2016) (21)
- Quantifying the Impact of Cyber-Attack Strategies for Control Systems Equipped With an Anomaly Detector (2018) (20)
- Actuator Security Indices Based on Perfect Undetectability: Computation, Robustness, and Sensor Placement (2018) (20)
- Nonlinear Consensus Protocols With Applications to Quantized Communication and Actuation (2019) (19)
- Distributed Leader Selection without Direct Inter-Agent Communication (2010) (19)
- Energy and CO2 efficient scheduling of smart appliances in active houses equipped with batteries (2014) (19)
- How to Secure Distributed Filters Under Sensor Attacks (2020) (19)
- Secure Estimation and Zero-Error Secrecy Capacity (2016) (18)
- Quantifying Cyber-Security for Networked Control Systems (2013) (18)
- On Model Reduction of Polynomial Dynamical Systems (2005) (18)
- Frequency-Weighted Model Reduction with Applications to Structured Models (2007) (18)
- Distributed Fault Detection and Isolation with imprecise network models (2012) (18)
- Dissipativity-Preserving Model Reduction for Large-Scale Distributed Control Systems (2015) (18)
- LQG and Medium Access Control (2009) (18)
- Model reduction of networked passive systems through clustering (2013) (18)
- Steady state performance analysis of multiple state-based schedulers with CSMA (2011) (18)
- Analysis and Distributed Control of Periodic Epidemic Processes (2019) (17)
- Uncertain wiretap channels and secure estimation (2016) (17)
- Distributed Sensor and Actuator Reconfiguration for Fault-Tolerant Networked Control Systems (2018) (17)
- Distributed actuator reconfiguration in networked control systems (2013) (17)
- Coherency-independent structured model reduction of power systems (2014) (17)
- Anomaly Detector Metrics for Sensor Data Attacks in Control Systems (2018) (16)
- Performance metrics for droop-controlled microgrids with variable voltage dynamics (2015) (16)
- Secure estimation for unstable systems (2016) (16)
- On Fundamental Limitations of Dynamic Feedback Control in Regular Large-Scale Networks (2017) (16)
- Distributed Controllers for Multi-Terminal HVDC Transmission Systems (2014) (16)
- Control of MTDC transmission systems under local information (2014) (16)
- Wireless event-triggered controller for a 3D tower crane lab process (2011) (15)
- Structured Model Order Reduction of Parallel Models in Feedback (2013) (15)
- Network structure preserving model reduction with weak a priori structural information (2009) (15)
- Structured model reduction of power systems (2012) (15)
- Directed Information as Privacy Measure in Cloud-based Control (2017) (15)
- Computing the L2 gain for linear periodic continuous-time systems (2009) (13)
- The Meaning of Structure in Interconnected Dynamic Systems (2011) (13)
- Optimal state estimation with measurements corrupted by Laplace noise (2016) (13)
- Model Reduction for Linear Time-Varying Systems (2004) (13)
- Towards more Efficient Building Energy Management Systems (2012) (13)
- Stability analysis of multiple state-based schedulers with CSMA (2012) (13)
- Secure Distributed Filtering for Unstable Dynamics Under Compromised Observations (2019) (13)
- Linear-quadratic-Gaussian heat engines (2007) (12)
- The Conservation of Information, Towards an Axiomatized Modular Modeling Approach to Congestion Control (2013) (12)
- Networked Multi-Virus Spread with a Shared Resource: Analysis and Mitigation Strategies (2020) (12)
- Networked Model for Cooperative Adaptive Cruise Control (2019) (12)
- Cascade structural model approximation of identified state space models (2008) (12)
- Large Scale Rollout of Smart Grid Services (2018) (11)
- Structured model reduction of interconnected linear systems based on singular perturbation (2013) (11)
- Inverted Pendulum Control over an IEEE 802.15.4 Wireless Sensor and Actuator Network (2011) (11)
- On Identification of Parallel Cascade Serial Systems (2011) (11)
- Performance and scalability of voltage controllers in multi-terminal HVDC networks (2016) (11)
- A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems (2018) (10)
- Towards a thermodynamics of control: Entropy, energy and Kalman filtering (2013) (10)
- Distributed fault detection for interconnected second-order systems with applications to power networks (2010) (10)
- Balanced model reduction of linear time-varying systems (2002) (10)
- The Statistical Mechanics of Fluctuation-Dissipation and Measurement Back Action (2006) (10)
- Consistency-preserving event-triggered estimation in sensor networks (2015) (10)
- Thermodynamics of linear systems (2007) (10)
- Secure Networked Control Systems (2021) (9)
- Reduced-order predictive outage compensators for networked systems (2009) (9)
- Retrofitting state feedback control of networked nonlinear systems based on hierarchical expansion (2016) (9)
- On subspace identification of cascade structured systems (2010) (9)
- Optimal Weight Allocation of Dynamic Distribution Networks and Positive Semi-definiteness of Signed Laplacians (2018) (9)
- A Network Monitoring Game with Heterogeneous Component Criticality Levels (2019) (9)
- Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach (2019) (9)
- Data-Driven Set-Based Estimation using Matrix Zonotopes with Set Containment Guarantees (2021) (9)
- Parameter Privacy versus Control Performance: Fisher Information Regularized Control (2020) (9)
- The Interconnection of Quadratic Droop Voltage Controllers Is a Lotka-Volterra System: Implications for Stability Analysis (2017) (9)
- Regret Lower Bounds for Learning Linear Quadratic Gaussian Systems (2022) (8)
- Two-way coding in control systems under injection attacks: from attack detection to attack correction (2019) (8)
- Localized high-order consensus destabilizes large-scale networks (2019) (8)
- Multi-hop sensor network scheduling for optimal remote estimation (2021) (8)
- On Uninformative Optimal Policies in Adaptive LQR with Unknown B-Matrix (2020) (8)
- Performance Limitations of Distributed Integral Control in Power Networks Under Noisy Measurements (2017) (8)
- Dynamical system decomposition using dissipation inequalities (2011) (8)
- A Security Index for Actuators Based on Perfect Undetectability: Properties and Approximation (2018) (8)
- Modelling and Control of Series HEVs Including Resistive Losses and Varying Engine Efficiency (2009) (8)
- Transfer-Entropy-Regularized Markov Decision Processes (2017) (8)
- Multiple access with attention-based tournaments for monitoring over wireless networks (2009) (7)
- Exploiting Submodularity in Security Measure Allocation for Industrial Control Systems (2017) (7)
- Design of Attack-Resilient Consensus Dynamics: A Game-Theoretic Approach (2019) (7)
- A Game-Theoretic Approach for Choosing a Detector Tuning Under Stealthy Sensor Data Attacks (2018) (7)
- Local voltage control of an inverter-based power distribution network with a class of slope-restricted droop controllers (2019) (7)
- Error bounds for balanced truncation of linear time-varying systems (2002) (7)
- A secure state estimation algorithm for nonlinear systems under sensor attacks (2020) (7)
- Rule-Based Control of Series HEVs Derived from Deterministic Dynamic Programming (2008) (7)
- Synchronization of Kuramoto Oscillators in a Bidirectional Frequency-Dependent Tree Network (2018) (7)
- Regret Lower Bounds for Unbiased Adaptive Control of Linear Quadratic Regulators (2020) (7)
- Analysis, Online Estimation, and Validation of a Competing Virus Model (2020) (7)
- Transfer function approximation and identification using magnitude and phase criteria (2006) (6)
- Privacy-Preserving Dual Averaging With Arbitrary Initial Conditions for Distributed Optimization (2021) (6)
- A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under $\mathcal {H}_2$ Performance Metric (2020) (6)
- Structured Model Order Reduction of Boiler-Header Models (2011) (6)
- Parameter-Invariant Actuator Fault Diagnostics in Cyber-Physical Systems with Application to Building Automation (2013) (6)
- Guest Editorial Distributed Control and Efficient Optimization Methods for Smart Grid (2017) (6)
- Nonlinear Modeling of Locomotive Propulsion System and Control (1999) (6)
- Protecting Positive and Second-Order Systems against Undetectable Attacks (2017) (6)
- The Observer Effect in Estimation with Physical Communication Constraints (2011) (6)
- On a Phase Transition of Regret in Linear Quadratic Control: The Memoryless Case (2021) (6)
- Ensuring Privacy of Occupancy Changes in Smart Buildings (2020) (6)
- Single Trajectory Nonparametric Learning of Nonlinear Dynamics (2022) (6)
- Harmonic modeling of the motor side of an inverter locomotive (2000) (6)
- A Graph-Theoretic Approach to the ℋ∞ Performance of Leader-Follower Consensus on Directed Networks (2019) (6)
- An axiomatic fluid-flow model for congestion control analysis (2011) (6)
- Modeling and Stability of Prosumer Heat Networks (2019) (6)
- Linear Time-Varying Systems: Modeling and Reduction (2002) (6)
- Correlated Failures of Power Systems : Analysis of the Nordic Grid (2011) (6)
- Structured power system model reduction of non-coherent areas (2012) (6)
- On the confidentiality of controller states under sensor attacks (2020) (5)
- Overcoming Challenges for Estimating Virus Spread Dynamics from Data (2020) (5)
- Method for Running Dynamic Systems over Encrypted Data for Infinite Time Horizon without Bootstrapping and Re-encryption (2021) (5)
- Security measure allocation for industrial control systems: Exploiting systematic search techniques and submodularity (2018) (5)
- Fault Detection and Mitigation in Kirchhoff Networks (2012) (5)
- Experimental validation of a localization system based on a heterogeneous sensor network (2009) (5)
- A robust control-design method using Bode's ideal transfer function (2011) (5)
- Fisher Information Privacy with Application to Smart Meter Privacy Using HVAC Units (2019) (5)
- Cyber-Secure and Resilient Architectures for Industrial Control Systems (2015) (5)
- Passive Fault-tolerant Estimation under Strategic Adversarial Bias (2020) (5)
- Nonlinear consensus protocols with applications to quantized systems (2016) (5)
- Noise-induced limitations to the scalability of distributed integral control (2018) (5)
- Dissipative open systems theory as a foundation for the thermodynamics of linear systems (2017) (5)
- Real-time fault diagnosis for large-scale nonlinear power networks (2013) (5)
- Resilient Estimation and Control on $k$-Nearest Neighbor Platoons: A Network-Theoretic Approach (2018) (5)
- Actuator Security Index for Structured Systems (2020) (4)
- Approximative model reconstruction of cascade systems (2014) (4)
- How are policy gradient methods affected by the limits of control? (2022) (4)
- Finite State Markov Decision Processes with Transfer Entropy Costs (2017) (4)
- Glocal control for network systems via hierarchical state-space expansion (2017) (4)
- Nonserial dynamic programming with applications in smart home appliances scheduling - Part II: Nonserial dynamic programming (2014) (4)
- Epistemic Signaling Games for Cyber Deception with Asymmetric Recognition (2021) (4)
- D-stability and delay-independent stability of monotone nonlinear systems with max-separable Lyapunov functions (2016) (4)
- Frequency-domain analysis of linear time-periodic systems (2004) (4)
- On performance limitations of congestion control (2009) (4)
- Wireless sensor network scheduling for remote estimation under energy constraints (2017) (4)
- Singular perturbation approximation of semistable linear systems (2013) (4)
- Bounding Privacy Leakage in Smart Buildings (2020) (4)
- Periodic Modelling of Power Systems (2001) (4)
- Dissipativity-preserving model reduction based on generalized singular perturbation (2013) (4)
- Modeling and Analysis of a Coupled SIS Bi-Virus Model (2022) (4)
- Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption (2020) (4)
- An Exact Solution to the Power Networks Security Index Problem and its Generalized Min Cut Formulation (2012) (4)
- Nonserial dynamic programming with applications in smart home appliances scheduling - Part I: Precedence graph simplification (2014) (4)
- A Randomized Filtering Strategy Against Inference Attacks on Active Steering Control Systems (2022) (3)
- Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption (2022) (3)
- A study on the sensitivity matrix in power system state estimation by using sparse principal component analysis (2016) (3)
- Parameterized model order reduction using extended balanced truncation (2012) (3)
- Sample-based anomaly detector tuning with finite sample guarantees (2021) (3)
- Controllability of a class of networked passive linear systems (2013) (3)
- On Fundamental Limitations of Dynamic Feedback Control in Large-Scale Networks (2017) (3)
- On Lossless Approximations , Fluctuation-Dissipation , and Limitations of Measurements (2010) (3)
- Estimating the Impact of Cyber-Attack Strategies for Stochastic Control Systems. (2018) (3)
- On Floquet-Fourier Realizations of Linear Time-Periodic Impulse Responses (2006) (3)
- Control over a Hybrid MAC Wireless Network (2010) (3)
- Optimization of the $\mathcal{H}_{\infty}$-norm of Dynamic Flow Networks (2018) (3)
- ASecureControl Framework for Resource-LimitedAdversaries ? (2015) (3)
- Stability Analysis and Design of a Network of Event-based Systems (2014) (3)
- Hankel-Norm-Based Lumping of Interconnected Linear Systems (2009) (3)
- On the Confidentiality of Linear Anomaly Detector States (2019) (3)
- Data-injection Attacks Using Historical Inputs and Outputs (2021) (3)
- A Risk-Theoretical Approach to $\mathcal{H}_{2}$-Optimal Control Under Covert Attacks (2018) (3)
- Data-Driven Distributed Mitigation Strategies and Analysis of Mutating Epidemic Processes (2020) (3)
- Optimization of the $H_\infty$-norm of Dynamic Flow Networks (2017) (3)
- A Graph-Theoretic Approach to the H ∞ Performance of Dynamical Systems on Directed and Undirected Networks ? (2018) (3)
- Disconnection-Aware Attack Detection and Isolation With Separation-Based Detector Reconfiguration (2020) (3)
- A Grassmannian approach to the Hankel norm approximation problem (2003) (3)
- Optimal H∞ control design under model information limitations and state measurement constraints (2013) (2)
- Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption (2021) (2)
- Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief (2020) (2)
- A Bayesian Nash equilibrium-based moving target defense against stealthy sensor attacks (2021) (2)
- Privacy-aware Minimum Error Probability Estimation: An Entropy Constrained Approach (2018) (2)
- Asymptotic Security by Model-based Incident Handlers for Markov Decision Processes (2021) (2)
- Hierarchical Model Decomposition for Distributed Design of Glocal Controllers (2019) (2)
- Model-Free Undetectable Attacks on Linear Systems Using LWE-Based Encryption (2023) (2)
- Proceedings of the 16th International symposium on Mathematical Theory of Networks and Systems (2004) (2)
- Minimum-time Secure Rollout of Software Updates for Controllable Power Loads (2020) (2)
- Deriving thermodynamics from linear dissipativity theory (2015) (2)
- Computer control systems. Analysis and design with process-oriented nodels: E. Rosenwasser and B. Lampe; Springer, London, 2000, ISBN 1-85233-307-3 (2002) (2)
- Multilayer SIS Model With an Infrastructure Network (2021) (2)
- A Nash equilibrium-based moving target defense against stealthy sensor attacks (2020) (2)
- Analysis of a Networked SIS Multi-Virus Model with a Shared Resource (2020) (2)
- Wiretap codes for secure multi-party computation (2014) (2)
- Multi-Layer Disease Spread Model with a Water Distribution Network (2019) (2)
- Computing the L 2 gain for linear periodic continuous-time systems ⋆ (2008) (1)
- Optimal Privacy-Aware Estimation (2021) (1)
- Finite Sample Guarantees for Quantile Estimation: An Application to Detector Threshold Tuning (2021) (1)
- Secure Patching of an Output-Feedback Controller for a Class of Nonlinear Systems Under Adversarial Attack (2018) (1)
- Power-system state-estimation security : Attacks and protection schemes (2010) (1)
- Distributed design of locally stabilizing controllers for large-scale networked linear systems (2015) (1)
- Asymptotic and finite-time almost global attitude tracking: representations free approach (2017) (1)
- Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption (2022) (1)
- A Graph-Theoretic Approach to the $\mathcal{H}_{\infty}$ Performance of Dynamical Systems on Directed and Undirected Networks (2018) (1)
- Stealthy False Data Injection Attacks in Feedback Systems Revisited (2021) (1)
- State-based Priorities for Tournaments in Wireless Networked Control Systems (2014) (1)
- Voltage regulation of a power distribution network in a radial configuration with a class of sector-bounded droop controllers (2019) (1)
- A Model Randomization Approach to Statistical Parameter Privacy (2021) (1)
- Resource Constrained Sensor Attacks by Minimizing Fisher Information (2020) (1)
- Leakage Localization in Water Distribution Networks: A Model-Based Approach (2022) (1)
- Experimental evaluation of sensor attacks and defense mechanisms in feedback systems (2021) (1)
- Maximizing Privacy in MIMO Cyber-Physical Systems Using the Chapman-Robbins Bound (2020) (1)
- Scale Fragilities in Localized Consensus Dynamics (2022) (1)
- Optimal H-infinity Control Design under Model Information Limitations and State Measurement Constraints (2013) (1)
- Power Injection Attacks in Smart Distribution Grids with Photovoltaics (2020) (1)
- Intrusion Resilience for PV Inverters in a Distribution Grid Use-Case Featuring Dynamic Voltage Control (2019) (1)
- Attack Impact Evaluation by Exact Convexification through State Space Augmentation (2022) (1)
- A Maximum Work Theorem for Maxwell's Demons (2014) (1)
- Control Theory for Practical Cyber-Physical Security: Extended Abstract (2018) (1)
- On the confidentiality of the reference signal under sensor attacks (2021) (1)
- Testbed Evaluation of DoS Attacks on PID-Controllers (2019) (1)
- Security index based on perfectly undetectable attacks: Graph-theoretic conditions (2021) (1)
- Complexity reduction for parameter-dependent linear systems (2012) (1)
- SiMpLIfy: A toolbox for structured model reduction (2014) (0)
- Approximation of Subnetwork Models using Frequency-Domain Data (2006) (0)
- Resilient Scheduling of Control Software Updates in Power Distribution Systems (2022) (0)
- Continuous Authentication Security Games (2021) (0)
- Privacy Enhancement of Structured Inputs in Cyber-Physical Systems (2021) (0)
- Distributed Design of Glocal Controllers via Hierarchical Model Decomposition (2020) (0)
- EnsuringPrivacywithConstrainedAdditiveNoise by MinimizingFisher Information (2018) (0)
- Secured Filters Based on Saturated Innovations (2022) (0)
- Attack Impact Evaluation for Stochastic Control Systems through Alarm Flag State Augmentation (2023) (0)
- A pr 2 01 6 Nonlinear consensus protocols with applications to quantized sytems (2018) (0)
- Analysis and Design with Process-Oriented Models (2007) (0)
- A QuAntitAtive Risk MAnAgeMent AppRoAch (2015) (0)
- Geometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics Attacks (2021) (0)
- Weak resilience of networked control systems (2015) (0)
- Cyber-Physical Security (2020) (0)
- Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs (2022) (0)
- A Cyber Security Study of a Stateoftheart Stateoftheart Stateoftheart oftheart oftheart theart theart SCADA Energy Management System : Stealthy Deception Attacks on the State Estimator (2010) (0)
- Practical Detectors to Identify Worst-Case Attacks (2022) (0)
- Adversarial Attacks on CFO-Based Continuous Physical Layer Authentication: A Game Theoretic Study (2021) (0)
- Distributed Design of Distributed Control Systems: A Compensation Principle for Controller Retrofit (2016) (0)
- Corrigendum to the article ‘Local voltage control of an inverter-based power distribution network with a class of slope-restricted droop controllers’* (2019) (0)
- Network Structure Preserving Model Reduction: Results of a Simulation Study (2009) (0)
- A Graph-Theoretic Approach to the <inline-formula> <tex-math notation="LaTeX">${\mathcal{H}}_{\infty}$ </tex-math></inline-formula> Performance of LeaderFollower Consensus on Directed Networks (2019) (0)
- On Actuator Security Indices (2019) (0)
- Asymptotic Stabilization over Encrypted Data with Limited Controller Capacity and Time-varying Quantizer (2022) (0)
- Disconnection-aware Attack Detection in Networked Control Systems (2019) (0)
- The Fundamental Limitations of Learning Linear-Quadratic Regulators (2023) (0)
- Complexity reduction for resilient state estimation of uniformly observable nonlinear systems (2023) (0)
- A Graph-Theoretic Equilibrium Analysis of Attacker-Defender Game on Consensus Dynamics Under <formula><tex>$\mathcal{H}_2$</tex></formula> Performance Metric (2020) (0)
- 1 M ay 2 01 6 Uncertain Wiretap Channels and Secure Estimation (2016) (0)
- A Graph-Theoretic Approach to the ${\mathcal{H}}_{\infty}$ Performance of Leader–Follower Consensus on Directed Networks (2019) (0)
- A Game-Theoretic Framework for Security-Aware Sensor Placement Problem in Networked Control Systems (2022) (0)
- REPORT D 4 . 2 Robust and Secure Communication Protocols (2011) (0)
- Mutating Epidemic Processes Over Time-Varying Networks in Discrete-Time (2019) (0)
- Finite-time consensus protocols for multi-dimensional multi-agent systems (2017) (0)
- Finite-time theormodynamics of port-Hamiltonian systems (2014) (0)
- Optimization of the <tex>$\mathcal{H}_{\infty}$</tex>-norm of Dynamic Flow Networks (2018) (0)
- RetrofitControl : Localization ofControllerDesign and Implementation ⋆ (2018) (0)
- Thermodynamic costs in implementing Kalman-Bucy filters (2014) (0)
- Strategic Monitoring of Networked Systems with Heterogeneous Security Levels (2023) (0)
- ASecureControlFrameworkfor Resource-LimitedAdversaries ? (2014) (0)
- Change time estimation uncertainty in nonlinear dynamical systems with applications to COVID‐19 (2022) (0)
- Asymptotic Security using Bayesian Defense Mechanisms with Application to Cyber Deception (2022) (0)
- Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks (2019) (0)
- Closed-loop Model Reduction of Parallel Models ? (2010) (0)
- Introduction to Model Order Reduction : Lecture Notes (2019) (0)
- Ju l 2 01 4 Maximum work extraction and implementation costs for non-equilibrium Maxwell ’ s demons (2018) (0)
- A Robust Control-Design Method Using Bode ’ s Ideal TransferFunction (2011) (0)
- Introduction to Model Order Reduction (2014) (0)
- Exact LASSO Solutions for a Class of Constrained Cardinality Minimization Problems (2012) (0)
- Adaptive voltage regulation of an inverter-based power distribution network with a class of droop controllers (2020) (0)
- Distributed Voltage and Current Control of Multi-Terminal High-Voltage Direct Current Systems (2014) (0)
This paper list is powered by the following services:
Other Resources About Henrik Sandberg
What Schools Are Affiliated With Henrik Sandberg?
Henrik Sandberg is affiliated with the following schools: