Security control for nonlinear systems under quantization and Round-Robin protocol subject to deception attacks

This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi–Sugeno (T–S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simult...

Full description

Saved in:
Bibliographic Details
Published inISA transactions Vol. 130; pp. 25 - 34
Main Authors Wu, Bo, Chang, Xiao-Heng
Format Journal Article
LanguageEnglish
Published United States Elsevier Ltd 01.11.2022
Subjects
Online AccessGet full text
ISSN0019-0578
1879-2022
1879-2022
DOI10.1016/j.isatra.2022.03.012

Cover

Abstract This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi–Sugeno (T–S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers’ parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method. •Security control problem is studied for nonlinear system based on T–S fuzzy method.•Dynamic quantization is considered for the measurement output and control input.•A novel framework is introduced for the impacts of RR protocol and deception attacks.•Sufficient LMIs-based conditions are established for the controller and quantizers.
AbstractList This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi–Sugeno (T–S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers’ parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method. •Security control problem is studied for nonlinear system based on T–S fuzzy method.•Dynamic quantization is considered for the measurement output and control input.•A novel framework is introduced for the impacts of RR protocol and deception attacks.•Sufficient LMIs-based conditions are established for the controller and quantizers.
This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers' parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers' parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.
This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception attacks based on the Takagi-Sugeno (T-S) fuzzy model. The measurement output and control input signals are quantized by dynamic quantizers simultaneously, and the quantized signals are transmitted through the communication channels scheduled by Round-Robin (RR) protocol. Moreover, two Bernoulli processes are utilized to characterize the deception attacks occurring on the different channels respectively. The mode-dependent observer-based controller and dynamic quantizers are designed such that the security in probability of the closed-loop system with the prescribed quadratic cost index can be guaranteed. Then, sufficient design conditions are obtained for the controller gains and quantizers' parameters based on the linear matrix inequalities (LMIs) approach. In the end, a numerical example is carried out to demonstrate the validity of the proposed method.
Author Wu, Bo
Chang, Xiao-Heng
Author_xml – sequence: 1
  givenname: Bo
  orcidid: 0000-0003-0844-8064
  surname: Wu
  fullname: Wu, Bo
  email: lwym126@163.com
– sequence: 2
  givenname: Xiao-Heng
  surname: Chang
  fullname: Chang, Xiao-Heng
  email: changxiaoheng@sina.com
BackLink https://www.ncbi.nlm.nih.gov/pubmed/35346484$$D View this record in MEDLINE/PubMed
BookMark eNqFkc1q3DAUhUVJaSZp3yAELbuxqz-PpSwCJaRJIVBI27WQ5SvQ1CNNJDkwffpo6qSLLNqV4Oo7517OOUFHIQZA6IySlhK6_rRpfTYlmZYRxlrCW0LZG7SislfNYXSEVoRQ1ZCul8foJOcNIYR1Sr5Dx7zjYi2kWKH4HeycfNljG0NJccIuJlxXTT6ASTjvc4FtxnMYIeGH2YTif5viY8AmjPg-1o_mPg4-4F2KJdrqkOdhA7bgEvEIFnYLXYqxv_J79NaZKcOH5_cU_fxy_ePqtrn7dvP16vNdY5lipeEDd5aOXJpBMNNxI5zjQMXA-h56JbjtCO2EdEY55UC6taKCsGFw0FEpCT9FHxffetXDDLnorc8WpskEiHPWbC2E4r1kB_T8GZ2HLYx6l_zWpL1-CakCYgFsijkncH8RSvShC73RSxf6ELwmXNcuquzilcz68ie6Svrpf-LLRQw1pEcPSWfrIVgYfarZ6jH6fxs8AVLJqYo
CitedBy_id crossref_primary_10_1007_s12555_024_0423_1
crossref_primary_10_1016_j_jfranklin_2025_107526
crossref_primary_10_1002_rnc_7934
crossref_primary_10_1016_j_isatra_2024_04_013
crossref_primary_10_1016_j_measurement_2025_116874
crossref_primary_10_1109_TSIPN_2024_3375596
crossref_primary_10_1016_j_jfranklin_2025_107529
crossref_primary_10_1002_rnc_6919
crossref_primary_10_1007_s11432_022_3817_5
crossref_primary_10_1016_j_isatra_2022_12_019
crossref_primary_10_1080_00207721_2023_2301037
crossref_primary_10_1016_j_isatra_2023_04_018
crossref_primary_10_1002_rnc_7389
crossref_primary_10_1109_TFUZZ_2023_3269786
crossref_primary_10_1016_j_jfranklin_2024_107502
Cites_doi 10.1002/rnc.5172
10.1016/j.jfranklin.2013.05.024
10.1109/TSMC.2018.2867213
10.1109/TAC.2017.2713353
10.1109/TII.2012.2219540
10.1016/j.automatica.2014.08.032
10.1109/TCYB.2016.2635122
10.1109/TCYB.2019.2941870
10.1109/TCYB.2017.2739754
10.1002/rnc.5040
10.1016/j.ins.2017.08.057
10.1109/TCYB.2018.2827037
10.1109/TCST.2009.2035611
10.1109/TFUZZ.2004.825085
10.1016/j.automatica.2016.07.025
10.1109/TAC.2019.2910167
10.1016/j.ins.2018.02.008
10.1109/TCYB.2019.2897366
10.1002/rnc.3598
10.1016/j.isatra.2016.09.026
10.1002/rnc.5251
10.1109/TSMC.2016.2616544
10.1109/TCYB.2018.2799929
10.1016/j.automatica.2004.12.011
10.1109/TAC.2009.2020638
10.1109/TAC.2019.2953210
10.1109/TAC.2018.2867340
10.1016/j.fss.2014.10.023
10.1016/j.jfranklin.2020.08.001
10.1016/j.sysconle.2014.05.001
10.1016/j.isatra.2019.04.017
10.1109/TII.2019.2916146
10.1002/rnc.5135
10.1109/TCYB.2019.2903817
10.1109/TAC.2010.2040497
10.1109/TIE.2016.2539259
10.1002/rnc.4672
10.1016/j.jfranklin.2015.05.035
10.1016/j.automatica.2019.108557
ContentType Journal Article
Copyright 2022 ISA
Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.
Copyright_xml – notice: 2022 ISA
– notice: Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.
DBID AAYXX
CITATION
NPM
7X8
DOI 10.1016/j.isatra.2022.03.012
DatabaseName CrossRef
PubMed
MEDLINE - Academic
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
PubMed
Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 1879-2022
EndPage 34
ExternalDocumentID 35346484
10_1016_j_isatra_2022_03_012
S001905782200132X
Genre Journal Article
GrantInformation_xml – fundername: National Nature Science Foundation of China
  grantid: 61773298; 62173261
  funderid: http://dx.doi.org/10.13039/501100001809
GroupedDBID ---
--K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29J
4.4
457
4G.
53G
5GY
5VS
6P2
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABFNM
ABFRF
ABJNI
ABMAC
ABNEU
ABTAH
ABXDB
ABYKQ
ACDAQ
ACFVG
ACGFO
ACNNM
ACRLP
ADBBV
ADEZE
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFDAS
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AIEXJ
AIKHN
AITUG
AIVDX
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
GBLVA
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q38
R2-
ROL
RPZ
SDF
SDG
SES
SET
SEW
SPC
SPCBC
SPD
SSQ
SST
SSZ
T5K
T9H
TAE
TN5
UHS
UNMZH
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
AFXIZ
AGCQF
AGRNS
BNPGV
NPM
SSH
7X8
ID FETCH-LOGICAL-c292t-3b3fc1d38ab42a53a4ff3e14b277e7943c501548fa9f9fe8f691402bbfe518803
IEDL.DBID .~1
ISSN 0019-0578
1879-2022
IngestDate Sat Sep 27 19:17:42 EDT 2025
Mon Jul 21 06:04:54 EDT 2025
Wed Oct 01 05:18:06 EDT 2025
Thu Apr 24 23:05:16 EDT 2025
Fri Feb 23 02:39:38 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Quantization
T–S fuzzy model
Protocol
Security control
Deception attacks
Language English
License Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c292t-3b3fc1d38ab42a53a4ff3e14b277e7943c501548fa9f9fe8f691402bbfe518803
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0003-0844-8064
PMID 35346484
PQID 2644937820
PQPubID 23479
PageCount 10
ParticipantIDs proquest_miscellaneous_2644937820
pubmed_primary_35346484
crossref_primary_10_1016_j_isatra_2022_03_012
crossref_citationtrail_10_1016_j_isatra_2022_03_012
elsevier_sciencedirect_doi_10_1016_j_isatra_2022_03_012
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-11-01
PublicationDateYYYYMMDD 2022-11-01
PublicationDate_xml – month: 11
  year: 2022
  text: 2022-11-01
  day: 01
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
PublicationTitle ISA transactions
PublicationTitleAlternate ISA Trans
PublicationYear 2022
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Lu, Yang (b9) 2017; 420
Zhang, Gao, Kaynak (b3) 2013; 9
Zhang, Shi, Wang, Yu (b4) 2017; 66
Liu, Fridman, Johansson, Xia (b29) 2016; 63
Ge, Han, Zhong, Zhang (b33) 2019; 109
Zou, Wang, Han, Zhou (b43) 2019; 64
Zhang, Yang, Yan, Chen (b19) 2015; 352
Cheng, Park, Wu, Yan (b35) 2021
Niu, Ho (b17) 2014; 50
Wu, Peng, Zhang, Yang, Zhang (b34) 2020; 104
Xiong, Chang, Park, Li (b18) 2020; 30
Shen, Huo, Cao, Huang (b30) 2019; 49
Zou, Wang, Gao (b20) 2016; 74
Li, Xiong (b13) 2021
Guan, Chen (b6) 2004; 12
Liu, Guo, Zhang, Xia (b37) 2020; 50
Chang, Huang, Park (b10) 2020; 16
Ding, Mei, Yu (b14) 2021
Wang, Yang, Xia, Wu, Shen (b24) 2021
Wu, Dong, Su, Li (b5) 2018; 48
Yue, Han, Lam (b1) 2005; 41
Ding, Wang, Han, Wei (b41) 2019; 49
Xu, Lu, Shi, Li, Xie (b28) 2018; 48
Shi, Yu (b7) 2009; 54
Chang, Zhang, Park (b39) 2015; 273
Coutinho, Fu, de Souza (b16) 2010; 55
Cao, Niu, Karimi (b26) 2020; 30
Zou, Wang, Han, Zhou (b22) 2017; 62
Zhai, Vamvoudakis (b32) 2021; 31
Zhang, Niu, Lam (b23) 2020; 50
Lu, Yang (b31) 2018; 439–440
Wang, Liu, Wang, Rees, Zhao (b2) 2010; 18
Song, Wang, Niu (b25) 2019; 64
Lu, Shi, Wu, Zhang (b38) 2020; 357
Xu, Su, Pan, Wu, Xu (b27) 2013; 350
Zong, Ren (b15) 2019; 29
Zhang, Han (b8) 2007; 27
Zhu, Zheng (b12) 2020; 65
Ugrinovskii, Fridman (b21) 2014; 69
Ding, Wang, Han, Wei (b36) 2018; 48
Min, Xu, Fei, Cui, Tan (b11) 2020; 30
Hu, Yue, Han, Xie, Chen, Dou (b42) 2020; 50
Chang, Yang, Xiong (b40) 2019; 49
Li (10.1016/j.isatra.2022.03.012_b13) 2021
Shen (10.1016/j.isatra.2022.03.012_b30) 2019; 49
Zhang (10.1016/j.isatra.2022.03.012_b4) 2017; 66
Min (10.1016/j.isatra.2022.03.012_b11) 2020; 30
Xiong (10.1016/j.isatra.2022.03.012_b18) 2020; 30
Zou (10.1016/j.isatra.2022.03.012_b20) 2016; 74
Chang (10.1016/j.isatra.2022.03.012_b39) 2015; 273
Zhang (10.1016/j.isatra.2022.03.012_b19) 2015; 352
Wu (10.1016/j.isatra.2022.03.012_b5) 2018; 48
Xu (10.1016/j.isatra.2022.03.012_b28) 2018; 48
Zhang (10.1016/j.isatra.2022.03.012_b23) 2020; 50
Wang (10.1016/j.isatra.2022.03.012_b24) 2021
Shi (10.1016/j.isatra.2022.03.012_b7) 2009; 54
Zhu (10.1016/j.isatra.2022.03.012_b12) 2020; 65
Zou (10.1016/j.isatra.2022.03.012_b22) 2017; 62
Zhang (10.1016/j.isatra.2022.03.012_b8) 2007; 27
Ding (10.1016/j.isatra.2022.03.012_b14) 2021
Zhang (10.1016/j.isatra.2022.03.012_b3) 2013; 9
Song (10.1016/j.isatra.2022.03.012_b25) 2019; 64
Zhai (10.1016/j.isatra.2022.03.012_b32) 2021; 31
Liu (10.1016/j.isatra.2022.03.012_b29) 2016; 63
Ding (10.1016/j.isatra.2022.03.012_b41) 2019; 49
Liu (10.1016/j.isatra.2022.03.012_b37) 2020; 50
Cao (10.1016/j.isatra.2022.03.012_b26) 2020; 30
Wu (10.1016/j.isatra.2022.03.012_b34) 2020; 104
Yue (10.1016/j.isatra.2022.03.012_b1) 2005; 41
Guan (10.1016/j.isatra.2022.03.012_b6) 2004; 12
Hu (10.1016/j.isatra.2022.03.012_b42) 2020; 50
Cheng (10.1016/j.isatra.2022.03.012_b35) 2021
Zou (10.1016/j.isatra.2022.03.012_b43) 2019; 64
Xu (10.1016/j.isatra.2022.03.012_b27) 2013; 350
Lu (10.1016/j.isatra.2022.03.012_b31) 2018; 439–440
Lu (10.1016/j.isatra.2022.03.012_b38) 2020; 357
Niu (10.1016/j.isatra.2022.03.012_b17) 2014; 50
Wang (10.1016/j.isatra.2022.03.012_b2) 2010; 18
Coutinho (10.1016/j.isatra.2022.03.012_b16) 2010; 55
Ugrinovskii (10.1016/j.isatra.2022.03.012_b21) 2014; 69
Chang (10.1016/j.isatra.2022.03.012_b40) 2019; 49
Lu (10.1016/j.isatra.2022.03.012_b9) 2017; 420
Ding (10.1016/j.isatra.2022.03.012_b36) 2018; 48
Chang (10.1016/j.isatra.2022.03.012_b10) 2020; 16
Zong (10.1016/j.isatra.2022.03.012_b15) 2019; 29
Ge (10.1016/j.isatra.2022.03.012_b33) 2019; 109
References_xml – volume: 273
  start-page: 87
  year: 2015
  end-page: 104
  ident: b39
  article-title: Robust static output feedback
  publication-title: Fuzzy Sets Syst
– volume: 69
  start-page: 103
  year: 2014
  end-page: 110
  ident: b21
  article-title: A round-robin type protocol for distributed estimation with
  publication-title: Syst Control Lett
– volume: 439–440
  start-page: 95
  year: 2018
  end-page: 107
  ident: b31
  article-title: Distributed consensus control for multi-agent systems under denial-of-service
  publication-title: Inf Sci
– volume: 62
  start-page: 6582
  year: 2017
  end-page: 6588
  ident: b22
  article-title: Ultimate boundedness control for networked systems with try-once-discard protocol and uniform quantization effects
  publication-title: IEEE Trans Automat Control
– volume: 66
  start-page: 376
  year: 2017
  end-page: 392
  ident: b4
  article-title: Analysis and synthesis of networked control systems: A survey of recent advances and challenges
  publication-title: ISA Trans
– volume: 65
  start-page: 3714
  year: 2020
  end-page: 3721
  ident: b12
  article-title: Observer-based control for cyber–physical systems with periodic DoS attacks via a cyclic switching strategy
  publication-title: IEEE Trans Automat Control
– volume: 109
  year: 2019
  ident: b33
  article-title: Distributed krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
– volume: 352
  start-page: 3476
  year: 2015
  end-page: 3488
  ident: b19
  article-title: Distributed event-triggered control for consensus of multi-agent systems
  publication-title: J Franklin Inst
– volume: 16
  start-page: 319
  year: 2020
  end-page: 327
  ident: b10
  article-title: Robust guaranteed cost control under digital communication channels
  publication-title: IEEE Trans Ind Inform
– volume: 48
  start-page: 2426
  year: 2018
  end-page: 2436
  ident: b5
  article-title: Asynchronous dissipative control for fuzzy Markov jump systems
  publication-title: IEEE Trans Cybern
– volume: 48
  start-page: 336
  year: 2018
  end-page: 345
  ident: b28
  article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels
  publication-title: IEEE Trans Cybern
– volume: 357
  start-page: 9834
  year: 2020
  end-page: 9852
  ident: b38
  article-title: Event-triggered interval type-2 T-S fuzzy control for nonlinear networked systems
  publication-title: J Franklin Inst
– volume: 50
  start-page: 1952
  year: 2020
  end-page: 1964
  ident: b42
  article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks
  publication-title: IEEE Trans Cybern
– volume: 27
  start-page: 679
  year: 2007
  end-page: 700
  ident: b8
  article-title: Event-triggered
  publication-title: Internat J Robust Nonlinear Control
– volume: 420
  start-page: 96
  year: 2017
  end-page: 109
  ident: b9
  article-title: Event-triggered secure observer-based control for cyber–physical systems under adversarial attacks
  publication-title: Inf Sci
– volume: 49
  start-page: 1292
  year: 2019
  end-page: 1301
  ident: b30
  article-title: Generalized state estimation for markovian coupled networks under round-robin protocol and redundant channels
  publication-title: IEEE Trans Cybern
– volume: 41
  start-page: 999
  year: 2005
  end-page: 1007
  ident: b1
  article-title: Network-based robust
  publication-title: Automatica
– volume: 31
  start-page: 1817
  year: 2021
  end-page: 1833
  ident: b32
  article-title: A data-based private learning framework for enhanced security against replay attacks in cyber–physical systems
  publication-title: Internat J Robust Nonlinear Control
– volume: 54
  start-page: 1668
  year: 2009
  end-page: 1674
  ident: b7
  article-title: Output feedback stabilization of networked control systems with random delays modeled by Markov chains
  publication-title: IEEE Trans Automat Control
– volume: 9
  start-page: 403
  year: 2013
  end-page: 416
  ident: b3
  article-title: Network-induced constraints in networked control systems–A survey
  publication-title: IEEE Trans Ind Inform
– volume: 74
  start-page: 341
  year: 2016
  end-page: 348
  ident: b20
  article-title: Set-membership filtering for time-varying systems with mixed time-delays under round-robin and weighted try-once-discard protocols
  publication-title: Automatica
– volume: 48
  start-page: 779
  year: 2018
  end-page: 789
  ident: b36
  article-title: Security control for discrete-time stochastic nonlinear systems subject to deception attacks
  publication-title: IEEE Trans Syst Man Cybern
– volume: 30
  start-page: 7307
  year: 2020
  end-page: 7325
  ident: b26
  article-title: Dynamic output feedback sliding mode control for Markovian jump systems under stochastic communication protocol and its application
  publication-title: Internat J Robust Nonlinear Control
– volume: 29
  start-page: 5251
  year: 2019
  end-page: 5273
  ident: b15
  article-title: Guaranteed cost finite-time control for semi-Markov jump systems with event-triggered scheme and quantization input
  publication-title: Internat J Robust Nonlinear Control
– year: 2021
  ident: b13
  article-title: Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks
  publication-title: ISA Trans
– year: 2021
  ident: b14
  article-title: Adaptive second-order sliding mode control: A Lyapunov approach
  publication-title: IEEE Trans Automat Control
– volume: 104
  start-page: 84
  year: 2020
  end-page: 92
  ident: b34
  article-title: Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks
  publication-title: ISA Trans
– volume: 64
  start-page: 5191
  year: 2019
  end-page: 5198
  ident: b43
  article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol
  publication-title: IEEE Trans Automat Control
– volume: 64
  start-page: 2174
  year: 2019
  end-page: 2181
  ident: b25
  article-title: On
  publication-title: IEEE Trans Automat Control
– volume: 350
  start-page: 2013
  year: 2013
  end-page: 2027
  ident: b27
  article-title: Stability analysis of networked control systems with round-robin scheduling and packet dropouts
  publication-title: J Franklin Inst
– volume: 49
  start-page: 2372
  year: 2019
  end-page: 2384
  ident: b41
  article-title: Neural-network-based output-feedback control under round-robin scheduling protocols
  publication-title: IEEE Trans Cybern
– volume: 30
  start-page: 8485
  year: 2020
  end-page: 8502
  ident: b11
  article-title: Observer-based tracking control for constrained nonlinear systems with mismatching disturbances and its application
  publication-title: Internat J Robust Nonlinear Control
– year: 2021
  ident: b24
  article-title: Observer-based sliding mode control for networked fuzzy singularly perturbed systems under weighted try-once-discard protocol
  publication-title: IEEE Trans Fuzzy Syst
– volume: 63
  start-page: 4461
  year: 2016
  end-page: 4471
  ident: b29
  article-title: Quantized control under round-robin communication protocol
  publication-title: IEEE Trans Ind Electron
– volume: 49
  start-page: 2005
  year: 2019
  end-page: 2015
  ident: b40
  article-title: Quantized fuzzy output feedback
  publication-title: IEEE Trans Syst Man Cybern
– volume: 50
  start-page: 2665
  year: 2014
  end-page: 2671
  ident: b17
  article-title: Control strategy with adaptive quantizer’s parameters under digital communication channels
  publication-title: Automatica
– volume: 18
  start-page: 1226
  year: 2010
  end-page: 1232
  ident: b2
  article-title: Guaranteed cost control for networked control systems based on an improved predictive control method
  publication-title: IEEE Trans Control Syst Technol
– volume: 12
  start-page: 236
  year: 2004
  end-page: 249
  ident: b6
  article-title: Delay-dependent guaranteed cost control for T-S fuzzy systems with time delays
  publication-title: IEEE Trans Fuzzy Syst
– volume: 50
  start-page: 4972
  year: 2020
  end-page: 4982
  ident: b23
  article-title: Sliding-mode control of T-S fuzzy systems under weighted try-once-discard protocol
  publication-title: IEEE Trans Cybern
– volume: 50
  start-page: 3571
  year: 2020
  end-page: 3580
  ident: b37
  article-title: Distributed secure filtering for discrete-time systems under round-robin protocol and deception attacks
  publication-title: IEEE Trans Cybern
– volume: 55
  start-page: 761
  year: 2010
  end-page: 766
  ident: b16
  article-title: Input and output quantized feedback linear systems
  publication-title: IEEE Trans Automat Control
– volume: 30
  start-page: 6720
  year: 2020
  end-page: 6743
  ident: b18
  article-title: Nonfragile fault-tolerant control of suspension systems subject to input quantization and actuator fault
  publication-title: Internat J Robust Nonlinear Control
– year: 2021
  ident: b35
  article-title: Ultimate boundedness control for networked singularly perturbed systems with deception attacks: A Markovian communication protocol approach
  publication-title: IEEE Trans Netw Sci Eng
– volume: 30
  start-page: 7307
  issue: 17
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b26
  article-title: Dynamic output feedback sliding mode control for Markovian jump systems under stochastic communication protocol and its application
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.5172
– volume: 350
  start-page: 2013
  issue: 8
  year: 2013
  ident: 10.1016/j.isatra.2022.03.012_b27
  article-title: Stability analysis of networked control systems with round-robin scheduling and packet dropouts
  publication-title: J Franklin Inst
  doi: 10.1016/j.jfranklin.2013.05.024
– volume: 49
  start-page: 2005
  issue: 10
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b40
  article-title: Quantized fuzzy output feedback H∞ control for nonlinear systems with adjustment of dynamic parameters
  publication-title: IEEE Trans Syst Man Cybern
  doi: 10.1109/TSMC.2018.2867213
– volume: 62
  start-page: 6582
  issue: 12
  year: 2017
  ident: 10.1016/j.isatra.2022.03.012_b22
  article-title: Ultimate boundedness control for networked systems with try-once-discard protocol and uniform quantization effects
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2017.2713353
– volume: 9
  start-page: 403
  issue: 1
  year: 2013
  ident: 10.1016/j.isatra.2022.03.012_b3
  article-title: Network-induced constraints in networked control systems–A survey
  publication-title: IEEE Trans Ind Inform
  doi: 10.1109/TII.2012.2219540
– volume: 50
  start-page: 2665
  issue: 10
  year: 2014
  ident: 10.1016/j.isatra.2022.03.012_b17
  article-title: Control strategy with adaptive quantizer’s parameters under digital communication channels
  publication-title: Automatica
  doi: 10.1016/j.automatica.2014.08.032
– volume: 48
  start-page: 336
  issue: 1
  year: 2018
  ident: 10.1016/j.isatra.2022.03.012_b28
  article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2016.2635122
– volume: 50
  start-page: 4972
  issue: 12
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b23
  article-title: Sliding-mode control of T-S fuzzy systems under weighted try-once-discard protocol
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2941870
– volume: 48
  start-page: 2426
  issue: 8
  year: 2018
  ident: 10.1016/j.isatra.2022.03.012_b5
  article-title: Asynchronous dissipative control for fuzzy Markov jump systems
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2017.2739754
– volume: 31
  start-page: 1817
  issue: 6
  year: 2021
  ident: 10.1016/j.isatra.2022.03.012_b32
  article-title: A data-based private learning framework for enhanced security against replay attacks in cyber–physical systems
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.5040
– volume: 420
  start-page: 96
  year: 2017
  ident: 10.1016/j.isatra.2022.03.012_b9
  article-title: Event-triggered secure observer-based control for cyber–physical systems under adversarial attacks
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2017.08.057
– volume: 49
  start-page: 2372
  issue: 6
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b41
  article-title: Neural-network-based output-feedback control under round-robin scheduling protocols
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2018.2827037
– year: 2021
  ident: 10.1016/j.isatra.2022.03.012_b24
  article-title: Observer-based sliding mode control for networked fuzzy singularly perturbed systems under weighted try-once-discard protocol
  publication-title: IEEE Trans Fuzzy Syst
– volume: 18
  start-page: 1226
  issue: 5
  year: 2010
  ident: 10.1016/j.isatra.2022.03.012_b2
  article-title: Guaranteed cost control for networked control systems based on an improved predictive control method
  publication-title: IEEE Trans Control Syst Technol
  doi: 10.1109/TCST.2009.2035611
– volume: 12
  start-page: 236
  issue: 2
  year: 2004
  ident: 10.1016/j.isatra.2022.03.012_b6
  article-title: Delay-dependent guaranteed cost control for T-S fuzzy systems with time delays
  publication-title: IEEE Trans Fuzzy Syst
  doi: 10.1109/TFUZZ.2004.825085
– volume: 74
  start-page: 341
  year: 2016
  ident: 10.1016/j.isatra.2022.03.012_b20
  article-title: Set-membership filtering for time-varying systems with mixed time-delays under round-robin and weighted try-once-discard protocols
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.07.025
– volume: 64
  start-page: 5191
  issue: 12
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b43
  article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2019.2910167
– volume: 439–440
  start-page: 95
  year: 2018
  ident: 10.1016/j.isatra.2022.03.012_b31
  article-title: Distributed consensus control for multi-agent systems under denial-of-service
  publication-title: Inf Sci
  doi: 10.1016/j.ins.2018.02.008
– volume: 50
  start-page: 3571
  issue: 8
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b37
  article-title: Distributed secure filtering for discrete-time systems under round-robin protocol and deception attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2897366
– volume: 27
  start-page: 679
  issue: 4
  year: 2007
  ident: 10.1016/j.isatra.2022.03.012_b8
  article-title: Event-triggered H∞ control for a class of nonlinear networked control systems using novel integral inequalities
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.3598
– volume: 66
  start-page: 376
  year: 2017
  ident: 10.1016/j.isatra.2022.03.012_b4
  article-title: Analysis and synthesis of networked control systems: A survey of recent advances and challenges
  publication-title: ISA Trans
  doi: 10.1016/j.isatra.2016.09.026
– volume: 30
  start-page: 8485
  issue: 18
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b11
  article-title: Observer-based tracking control for constrained nonlinear systems with mismatching disturbances and its application
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.5251
– volume: 48
  start-page: 779
  issue: 5
  year: 2018
  ident: 10.1016/j.isatra.2022.03.012_b36
  article-title: Security control for discrete-time stochastic nonlinear systems subject to deception attacks
  publication-title: IEEE Trans Syst Man Cybern
  doi: 10.1109/TSMC.2016.2616544
– year: 2021
  ident: 10.1016/j.isatra.2022.03.012_b35
  article-title: Ultimate boundedness control for networked singularly perturbed systems with deception attacks: A Markovian communication protocol approach
  publication-title: IEEE Trans Netw Sci Eng
– volume: 49
  start-page: 1292
  issue: 4
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b30
  article-title: Generalized state estimation for markovian coupled networks under round-robin protocol and redundant channels
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2018.2799929
– volume: 41
  start-page: 999
  issue: 6
  year: 2005
  ident: 10.1016/j.isatra.2022.03.012_b1
  article-title: Network-based robust H∞ control of systems with uncertainty
  publication-title: Automatica
  doi: 10.1016/j.automatica.2004.12.011
– volume: 54
  start-page: 1668
  issue: 7
  year: 2009
  ident: 10.1016/j.isatra.2022.03.012_b7
  article-title: Output feedback stabilization of networked control systems with random delays modeled by Markov chains
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2009.2020638
– volume: 65
  start-page: 3714
  issue: 8
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b12
  article-title: Observer-based control for cyber–physical systems with periodic DoS attacks via a cyclic switching strategy
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2019.2953210
– volume: 64
  start-page: 2174
  issue: 5
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b25
  article-title: On H∞ sliding mode control under stochastic communication protocol
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2018.2867340
– volume: 273
  start-page: 87
  year: 2015
  ident: 10.1016/j.isatra.2022.03.012_b39
  article-title: Robust static output feedback H∞ control for uncertain fuzzy systems
  publication-title: Fuzzy Sets Syst
  doi: 10.1016/j.fss.2014.10.023
– volume: 357
  start-page: 9834
  issue: 14
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b38
  article-title: Event-triggered interval type-2 T-S fuzzy control for nonlinear networked systems
  publication-title: J Franklin Inst
  doi: 10.1016/j.jfranklin.2020.08.001
– volume: 69
  start-page: 103
  year: 2014
  ident: 10.1016/j.isatra.2022.03.012_b21
  article-title: A round-robin type protocol for distributed estimation with H∞ consensus
  publication-title: Syst Control Lett
  doi: 10.1016/j.sysconle.2014.05.001
– volume: 104
  start-page: 84
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b34
  article-title: Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks
  publication-title: ISA Trans
  doi: 10.1016/j.isatra.2019.04.017
– volume: 16
  start-page: 319
  issue: 1
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b10
  article-title: Robust guaranteed cost control under digital communication channels
  publication-title: IEEE Trans Ind Inform
  doi: 10.1109/TII.2019.2916146
– volume: 30
  start-page: 6720
  issue: 16
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b18
  article-title: Nonfragile fault-tolerant control of suspension systems subject to input quantization and actuator fault
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.5135
– year: 2021
  ident: 10.1016/j.isatra.2022.03.012_b14
  article-title: Adaptive second-order sliding mode control: A Lyapunov approach
  publication-title: IEEE Trans Automat Control
– volume: 50
  start-page: 1952
  issue: 5
  year: 2020
  ident: 10.1016/j.isatra.2022.03.012_b42
  article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2903817
– year: 2021
  ident: 10.1016/j.isatra.2022.03.012_b13
  article-title: Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks
  publication-title: ISA Trans
– volume: 55
  start-page: 761
  issue: 3
  year: 2010
  ident: 10.1016/j.isatra.2022.03.012_b16
  article-title: Input and output quantized feedback linear systems
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2010.2040497
– volume: 63
  start-page: 4461
  issue: 7
  year: 2016
  ident: 10.1016/j.isatra.2022.03.012_b29
  article-title: Quantized control under round-robin communication protocol
  publication-title: IEEE Trans Ind Electron
  doi: 10.1109/TIE.2016.2539259
– volume: 29
  start-page: 5251
  issue: 15
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b15
  article-title: Guaranteed cost finite-time control for semi-Markov jump systems with event-triggered scheme and quantization input
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.4672
– volume: 352
  start-page: 3476
  issue: 9
  year: 2015
  ident: 10.1016/j.isatra.2022.03.012_b19
  article-title: Distributed event-triggered control for consensus of multi-agent systems
  publication-title: J Franklin Inst
  doi: 10.1016/j.jfranklin.2015.05.035
– volume: 109
  year: 2019
  ident: 10.1016/j.isatra.2022.03.012_b33
  article-title: Distributed krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.108557
SSID ssj0002598
Score 2.4012132
Snippet This paper is concerned with the security control problem for the nonlinear systems with the effects of quantization, communication protocol and deception...
SourceID proquest
pubmed
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 25
SubjectTerms Deception attacks
Protocol
Quantization
Security control
T–S fuzzy model
Title Security control for nonlinear systems under quantization and Round-Robin protocol subject to deception attacks
URI https://dx.doi.org/10.1016/j.isatra.2022.03.012
https://www.ncbi.nlm.nih.gov/pubmed/35346484
https://www.proquest.com/docview/2644937820
Volume 130
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1879-2022
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002598
  issn: 0019-0578
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier ScienceDirect
  customDbUrl:
  eissn: 1879-2022
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002598
  issn: 0019-0578
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1879-2022
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002598
  issn: 0019-0578
  databaseCode: ACRLP
  dateStart: 19950301
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection Journals
  customDbUrl:
  eissn: 1879-2022
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002598
  issn: 0019-0578
  databaseCode: AIKHN
  dateStart: 19950301
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1879-2022
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002598
  issn: 0019-0578
  databaseCode: AKRWK
  dateStart: 19890101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEB5CekkPpXm03aYNKvSQHtSsJfmhY1gatq9Qkgb2JiRLgoSym-56r_ntnZHlpDmEQE7GRsJCM56HNd83AB8D6qxz5Zj7Ko65cqXm2qMxxFwj6jraICoCJ_88raYX6tusnG3AZMDCUFlltv29TU_WOj85yrt5dH15SRhfdGbExi7SgcGMEOyqpi4Gn2_uyjwwvM_WWHMaPcDnUo0XVcwsiX1IiER1WoiH3NND4WdyQycv4UWOH9lxv8Rt2AjzHXj-H6vgDmzn73XFDjOp9KddWJznRnUsF6czjFbZvCfKsEvWMzqvGGHKluzvGjc8IzSZnXt2Rt2XeAKLMaJ2WKD-sNXa0V8c1i2YD7k8htmuI9j-HlycfPk9mfLcbIG3QouOSydjW3jZWKeELaVVMcpQKCfqOhCLXFum9CZaHXUMTaw05mbCuRgSp5t8BZu46PAGGM70mCV510ShrGusd3XhhWwbP3a6sCOQwx6bNjORU0OMP2YoObsyvWQMScaMpUHJjIDfzrrumTgeGV8P4jP3NMqgs3hk5odB2gY_NjpBsfOwWK8MRY8Yz2HUNILXvRrcrkWWUlWqUW-f_N592KK7Hun4Dja75Tq8x5CncwdJpw_g2fHk7Mcvun79Pj39B8D0BGw
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5Remg5VEBbWPpypR7ag8vGdrLxsUKgbQsceEh7s-zYlkBoF3azV347M45DywEhcU1sxZoZzyOe7zPAt4A261w55L6KQ65cqbn26Ayx1oh6FG0QFYGTj46r8bn6MyknK7DXY2GorTL7_s6nJ2-dn-xmae5eX1wQxheDGbGxi3RgMHkBL1UpRlSB_bz91-eB-X12x5rT8B4_l5q8qGVmTvRDQiSu00I8Fp8eyz9THDpYhzc5gWS_ujVuwEqYbsLaf7SCm7CRN-yCfc-s0j_ewuw031THcnc6w3SVTTumDDtnHaXzghGobM5ulijxDNFkdurZCV2_xBNajBG3wwwNiC2Wjn7jsHbGfMj9Mcy2LeH238H5wf7Z3pjn2xZ4I7RouXQyNoWXtXVK2FJaFaMMhXIo0kA0ck2Z6ptoddQx1LHSWJwJ52JIpG7yPaziosM2MJzpsUzyro5CWVdb70aFF7Kp_dDpwg5A9jI2TaYipxsxrkzfc3ZpOs0Y0owZSoOaGQC_n3XdUXE8MX7Uq888MCmD0eKJmV97bRvcbXSEYqdhtlwYSh8xocO0aQBbnRncr0WWUlWqVjvP_u4XeDU-Ozo0h7-P_36A1_Smgz1-hNV2vgyfMP9p3edk33ePaQRs
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+control+for+nonlinear+systems+under+quantization+and+Round-Robin+protocol+subject+to+deception+attacks&rft.jtitle=ISA+transactions&rft.au=Wu%2C+Bo&rft.au=Chang%2C+Xiao-Heng&rft.date=2022-11-01&rft.issn=1879-2022&rft.eissn=1879-2022&rft.volume=130&rft.spage=25&rft_id=info:doi/10.1016%2Fj.isatra.2022.03.012&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0019-0578&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0019-0578&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0019-0578&client=summon