By Topic

# IEEE Transactions on Control of Network Systems

Includes the top 50 most frequently accessed documents for this publication according to the usage statistics for the month of

• ### Controllability Metrics, Limitations and Algorithms for Complex Networks

Publication Year: 2014, Page(s):40 - 52
Cited by:  Papers (66)
| | PDF (1912 KB) | HTML

This paper studies the problem of controlling complex networks, i.e., the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem, 1) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, 2) we derive bounds based on the system dynamics (network topology a... View full abstract»

• ### Convex Relaxation of Optimal Power Flow—Part I: Formulations and Equivalence

Publication Year: 2014, Page(s):15 - 27
Cited by:  Papers (98)  |  Patents (1)
| | PDF (2490 KB) | HTML

This tutorial summarizes recent advances in the convex relaxation of the optimal power flow (OPF) problem, focusing on structural properties rather than algorithms. Part I presents two power flow models, formulates OPF and their relaxations in each model, and proves equivalence relationships among them. Part II presents sufficient conditions under which the convex relaxations are exact. View full abstract»

• ### Optimal Linear Cyber-Attack on Remote State Estimation

Publication Year: 2017, Page(s):4 - 13
Cited by:  Papers (2)
| | PDF (600 KB) | HTML

Recent years have witnessed the surge of interest of security issues in cyber-physical systems. In this paper, we consider malicious cyber attacks in a remote state estimation application where a smart sensor node transmits data to a remote estimator equipped with a false data detector. It is assumed that all the sensor data can be observed and modified by the malicious attacker and a residue-base... View full abstract»

• ### Botnet Detection Based on Anomaly and Community Detection

Publication Year: 2017, Page(s):392 - 404
| | PDF (893 KB) | HTML

We introduce a novel two-stage approach for the important cybersecurity problem of detecting the presence of a botnet and identifying the compromised nodes (the bots), ideally before the botnet becomes active. The first stage detects anomalies by leveraging large deviations of an empirical distribution. We propose two approaches to create the empirical distribution: 1) a flow-based approach estima... View full abstract»

• ### Analysis of Failures in Power Grids

Publication Year: 2017, Page(s):288 - 300
Cited by:  Papers (2)
| | PDF (2092 KB) | HTML

This paper focuses on line failures in the transmission system of power grids. Recent large-scale power outages demonstrated the limitations of percolation- and epidemic-based tools in modeling failures and cascades in power grids. Hence, we study failures and cascades by using computational tools and a linearized power-flow model. We first obtain results regarding the Moore-Penrose pseudoinverse ... View full abstract»

• ### Event-Triggered Control Systems Under Denial-of-Service Attacks

Publication Year: 2017, Page(s):93 - 105
| | PDF (661 KB) | HTML

In this paper, we propose a systematic design framework for output-based dynamic event-triggered control (ETC) systems under denial-of-service (DoS) attacks. These malicious DoS attacks are intended to interfere with the communication channel causing periods in time at which transmission of measurement data is impossible. We show that the proposed ETC scheme, if well designed, can tolerate a class... View full abstract»

• ### Uncovering Droop Control Laws Embedded Within the Nonlinear Dynamics of Van der Pol Oscillators

Publication Year: 2017, Page(s):347 - 358
Cited by:  Papers (1)
| | PDF (1076 KB) | HTML

This paper examines the dynamics of power-electronic inverters in islanded microgrids that are controlled to emulate the dynamics of Van der Pol oscillators. The general strategy of controlling inverters to emulate the behavior of nonlinear oscillators presents a compelling time-domain alternative to ubiquitous droop control methods which presume the existence of a quasistationary sinusoidal stead... View full abstract»

• ### Energy-Based Lifetime Maximization and Security of Wireless-Sensor Networks With General Nonideal Battery Models

Publication Year: 2017, Page(s):323 - 335
| | PDF (1185 KB) | HTML

We study the problem of maximizing the lifetime of a sensor network by means of routing and initial energy allocation over its nodes. We consider a general state space battery model and show that similar results to our previous work with simpler battery dynamics are still valid. In particular, we show that under this general dynamic battery model, there exists an optimal policy consisting of time-... View full abstract»

• ### Connecting Automatic Generation Control and Economic Dispatch From an Optimization View

Publication Year: 2016, Page(s):254 - 264
Cited by:  Papers (2)
| | PDF (653 KB) | HTML

Automatic generation control (AGC) regulates mechanical power generation in response to load changes through local measurements. Its main objective is to maintain system frequency and keep energy balanced within each control area in order to maintain the scheduled net interchanges between control areas. The scheduled interchanges as well as some other factors of AGC are determined at a slower time... View full abstract»

• ### Security Assessment of Electricity Distribution Networks Under DER Node Compromises

Publication Year: 2017, Page(s):23 - 36
Cited by:  Papers (2)
| | PDF (1530 KB) | HTML

This paper focuses on the security assessment of electricity distribution networks (DNs) with vulnerable distributed energy resource (DER) nodes. The adversary model is a simultaneous compromise of DER nodes by strategic manipulation of generation setpoints. The loss to the defender (DN operator) includes loss of voltage regulation and cost of induced load control under supply-demand mismatch caus... View full abstract»

• ### Secure State Estimation Against Sensor Attacks in the Presence of Noise

Publication Year: 2017, Page(s):49 - 59
| | PDF (474 KB) | HTML

We consider the problem of estimating the state of a noisy linear dynamical system when an unknown subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm, and derive (optimal) bounds on the achievable state estimation error given an upper bound on the number of attacked sensors. The proposed state estimator involves Kalman filters operating over ... View full abstract»

• ### Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks

Publication Year: 2017, Page(s):106 - 117
Cited by:  Papers (1)
| | PDF (836 KB) | HTML

This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while... View full abstract»

• ### Overview: Collective Control of Multiagent Systems

Publication Year: 2016, Page(s):334 - 347
Cited by:  Papers (4)
| | PDF (337 KB) | HTML

Collective control of a multiagent system is concerned with designing strategies for a group of autonomous agents operating in a networked environment. The aim is to achieve a global control objective through distributed sensing, communication, computing, and control. It has attracted many researchers from a wide range of disciplines, including the literature of automatic control. This paper aims ... View full abstract»

• ### On the Robustness of Uncertain Consensus Networks

Publication Year: 2017, Page(s):170 - 178
Cited by:  Papers (2)
| | PDF (822 KB) | HTML

This work considers the robustness of uncertain consensus networks. The stability properties of consensus networks with negative edge weights are also examined. We show that the network is unstable if either the negative weight edges form a cut in the graph or any single negative edge weight has a magnitude less than the inverse of the effective resistance between the two incident nodes. These res... View full abstract»

• ### Dynamic State Recovery for Cyber-Physical Systems Under Switching Location Attacks

Publication Year: 2017, Page(s):14 - 22
| | PDF (1002 KB) | HTML

Malicious data attacks have raised widespread concerns on data integrity and security of cyber-physical systems. This paper discusses a state recovery problem, where the underlying cyber-physical system is subject to switching location attacks. Compared with the fix location attack, the switching location attack changes the attack locations at a constant/variable frequency. This paper develops non... View full abstract»

• ### Distributed Finite-Time Average-Consensus With Limited Computational and Storage Capability

Publication Year: 2017, Page(s):380 - 391
| | PDF (2463 KB) | HTML

Consensus is a fundamental feature of distributed systems, and it is the prerequisite for several complex tasks, such as flocking of mobile robots, localization in wireless-sensor networks, or decentralized control of smart grids. Average consensus, in particular, is quite challenging, because it is typically obtained asymptotically, while few finite-time algorithms are available. In this paper, w... View full abstract»

• ### Online Distributed Voltage Stress Minimization by Optimal Feedback Reactive Power Control

Publication Year: 2017, Page(s): 1
| | PDF (1997 KB)

A standard operational requirement in power systems is that the voltage magnitudes lie within prespecified bounds. Conventional engineering wisdom suggests that having a tightly-regulated voltage profile should also guarantee that the system operates far from static bifurcation instabilities such as voltage collapse. In general however, these two objectives are distinct and must be separately enfo... View full abstract»

• ### Convex Relaxation of Optimal Power Flow—Part II: Exactness

Publication Year: 2014, Page(s):177 - 189
Cited by:  Papers (56)
| | PDF (635 KB) | HTML

This tutorial summarizes recent advances in the convex relaxation of the optimal power flow (OPF) problem, focusing on structural properties rather than algorithms. Part I presents two power flow models, formulates OPF and their relaxations in each model, and proves equivalence relations among them. Part II presents sufficient conditions under which the convex relaxations are exact. View full abstract»

• ### Supervisory Control of Networked Timed Discrete Event Systems and Its Applications to Power Distribution Networks

Publication Year: 2017, Page(s):146 - 158
Cited by:  Papers (1)
| | PDF (1993 KB) | HTML

This paper treats the problem of existence of a controller for networked-timed discrete-event systems. The results are new and useful for any networked discrete-event system for which it is important that time be explicitly considered in the model. We assume that a controller (supervisor) communicates with the system to be controlled via a shared communication network. Delays and losses in communi... View full abstract»

• ### Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter

Publication Year: 2014, Page(s):370 - 379
Cited by:  Papers (21)
| | PDF (1052 KB) | HTML

By exploiting the communication infrastructure among the sensors, actuators, and control systems, attackers may compromise the security of smart-grid systems, with techniques such as denial-of-service (DoS) attack, random attack, and data-injection attack. In this paper, we present a mathematical model of the system to study these pitfalls and propose a robust security framework for the smart grid... View full abstract»

• ### Optimal Resource Allocation for Control of Networked Epidemic Models

Publication Year: 2017, Page(s):159 - 169
Cited by:  Papers (2)
| | PDF (796 KB) | HTML

This paper proposes and analyzes a generalized epidemic model over arbitrary directed graphs with heterogeneous nodes. The proposed model, called the generalized-susceptible exposed infected vigilant, subsumes a large number of popular epidemic models considered in the literature as special cases. Using a mean-field approximation, we derive a set of ODEs describing the spreading dynamics, provide ... View full abstract»

• ### Breaking the Hierarchy: Distributed Control and Economic Optimality in Microgrids

Publication Year: 2016, Page(s):241 - 253
Cited by:  Papers (17)
| | PDF (543 KB) | HTML

Modeled after the hierarchical control architecture of power transmission systems, a layering of primary, secondary, and tertiary control has become the standard operation paradigm for islanded microgrids. Despite this superficial similarity, the control objectives in microgrids across these three layers are varied and ambitious, and they must be achieved while allowing for robust plug-and-play op... View full abstract»

• ### Structural Monostability of Activation-Inhibition Boolean Networks

Publication Year: 2017, Page(s):179 - 190
| | PDF (1375 KB) | HTML

Although any networked control system is specified by the combination of the network structure and the dynamics of the components, one often encounters a situation where the former is known but the latter is (almost) unknown. In such a case, we cannot apply any analysis and design method using the full information of the target system. So it is desirable to establish a framework of the structural ... View full abstract»

• ### A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems

Publication Year: 2017, Page(s):60 - 70
| | PDF (491 KB) | HTML

This paper considers secure design in distributed control systems to ensure the detection of stealthy integrity attacks. Distributed control systems consist of many heterogeneous components, such as sensors, controllers, and actuators and may contain several independent agents. The presence of many components and agents in a system increases the attack surfaces for potential adversaries, making di... View full abstract»

• ### Maximizing Algebraic Connectivity in the Space of Graphs With a Fixed Number of Vertices and Edges

Publication Year: 2017, Page(s):359 - 368
| | PDF (1193 KB) | HTML

The second smallest eigenvalue of the Laplacian matrix, also known as the algebraic connectivity, characterizes the performance of some dynamic processes on networks, such as consensus in multiagent networks, synchronization of coupled oscillators, random walks on graphs, and so on. In a multiagent network, for example, the larger the algebraic connectivity of the graph representing interactions b... View full abstract»

• ### Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs

Publication Year: 2017, Page(s):118 - 130
| | PDF (431 KB) | HTML

In distributed control systems with shared resources, participating agents can improve the overall performance of the system by sharing data about their personal preferences. In this paper, we formulate and study a natural tradeoff arising in these problems between the privacy of the agent's data and the performance of the control system. We formalize privacy in terms of differential privacy of ag... View full abstract»

• ### Secure State Estimation and Control for Cyber Security of the Nonlinear Power Systems

Publication Year: 2017, Page(s): 1
| | PDF (1157 KB)

We focus on securely estimating the state of a nonlinear dynamical system from a set of corrupted measurements for two classes of nonlinear systems, and propose a technique which enables us to perform secure state estimation for those systems. We then illustrate how the proposed nonlinear secure state estimation technique can be used to perform estimation in the cyber layer of interconnected power... View full abstract»

• ### Time-Varying Output Formation for Linear Multiagent Systems via Dynamic Output Feedback Control

Publication Year: 2017, Page(s):236 - 245
| | PDF (726 KB) | HTML

Time-varying output formation control problems for linear multiagent systems with directed interaction topologies are studied using a dynamic output feedback approach. First, a dynamic output formation protocol is constructed using the outputs of neighboring agents. Based on the output decomposition, observability decomposition and output formation decomposition, necessary and sufficient condition... View full abstract»

• ### Attack-Resilient State Estimation for Noisy Dynamical Systems

Publication Year: 2017, Page(s):82 - 92
Cited by:  Papers (1)
| | PDF (386 KB) | HTML

Several recent incidents have clearly illustrated the susceptibility of cyberphysical systems (CPS) to attacks, raising attention to security challenges in these systems. The tight interaction between information technology and the physical world has introduced new vulnerabilities that cannot be addressed with the use of standard cryptographic security techniques. Accordingly, the problem of state... View full abstract»

• ### An Anytime Distributed Load-Balancing Algorithm Satisfying Capacity and Quantization Constraints

Publication Year: 2017, Page(s):279 - 287
| | PDF (1081 KB) | HTML

Current research in the field of distributed consensus algorithms fails to adequately address physical limitations of real systems. This paper proposes a new algorithm for quantized distributed load balancing over a network of agents subject to upper-limit constraints. More precisely, loads are integer values, and nodes are constrained to remain under maximum load capacities at all times. Converge... View full abstract»

• ### Analysis for the Robust $H_{\infty}$ Synchronization of Nonlinear Stochastic Coupling Networks Through Poisson Processes and Core Coupling Design

Publication Year: 2017, Page(s):223 - 235
| | PDF (2462 KB) | HTML

In this paper, we discuss a robust synchronization problem for nonlinear stochastic coupling networks through Poisson processes. The asymptotical synchronizability in probability is examined via the Hamilton-Jacobi inequality (HJI) criterion. Further, in order to effectively filter external disturbances of the nonlinear stochastic coupling networks, synchronization robustness can be guaranteed by ... View full abstract»

• ### Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems

Publication Year: 2017, Page(s):71 - 81
| | PDF (341 KB) | HTML

We model attacks on a cyberphysical system as a game between two players-the attacker and the system. The players may not acquire the complete information about each other, and that leads to an asymmetric information game. Furthermore, the players may have a certain fixed amount of resources, which constrains their strategies across time. Accordingly, we consider a dynamic multiplayer nonzero sum ... View full abstract»

• ### Consensus Error Calculation for Multi-Agent Systems with Both System and Measurement Noises

Publication Year: 2017, Page(s): 1
| | PDF (443 KB)

This paper investigates consensus problem for multiagent systems (MASs) with both system noises and measurement noises. By applying Kalman filtering and weighted-average estimation fusion, a novel consensus protocol is designed based on distributed state estimation. It is shown that, under the proposed protocol, the consensus error is bounded and can be exactly characterized via the solution to a ... View full abstract»

• ### Distributed optimal Load Frequency Control with non-passive dynamics

Publication Year: 2017, Page(s): 1
| | PDF (2407 KB)

Motivated by an increase of renewable energy sources we propose a distributed optimal Load Frequency Control scheme achieving frequency regulation and economic dispatch. Based on an energy function of the power network we derive an incremental passivity property for a well known nonlinear structure preserving network model, differentiating between generator and load buses. Exploiting this property... View full abstract»

• ### Distributed PID Control for Consensus of Homogeneous and Heterogeneous Networks

Publication Year: 2015, Page(s):154 - 163
Cited by:  Papers (8)
| | PDF (434 KB) | HTML

We investigate the use of distributed proportional-integral-derivative (PID) actions to achieve consensus in networks of homogeneous and heterogeneous linear systems. Convergence of the strategy is proved for both cases using appropriate state transformations and Lyapunov functions. The effectiveness of the theoretical results is illustrated via its application to a representative power-grid model... View full abstract»

• ### Distributed Generator Coordination for Initialization and Anytime Optimization in Economic Dispatch

Publication Year: 2015, Page(s):226 - 237
Cited by:  Papers (14)
| | PDF (499 KB) | HTML

This paper considers the economic dispatch problem for a group of generator units communicating over an arbitrary weight-balanced digraph. The objective of the individual units is to collectively generate power to satisfy a certain load while minimizing the total generation cost, which corresponds to the sum of individual arbitrary convex functions. We propose a class of distributed Laplacian-grad... View full abstract»

• ### Quantized $H_{\infty}$ Consensus of Multiagent Systems With Quantization Mismatch Under Switching Weighted Topologies

Publication Year: 2017, Page(s):202 - 212
Cited by:  Papers (1)
| | PDF (802 KB) | HTML

This paper investigates the distributed quantized H∞ consensus problems for general linear and Lipschitz nonlinear multiagent systems with input quantization mismatch and external disturbances under switching weighted undirected or balanced directed topologies. The designed distributed quantized H∞ consensus protocol can be divided into two parts which are linea... View full abstract»

• ### An Adaptive Switched Control Approach to Heterogeneous Platooning with Inter-Vehicle Communication Losses

Publication Year: 2017, Page(s): 1
| | PDF (1867 KB)

The advances in distributed inter-vehicle communication networks have stimulated a fruitful line of research in Cooperative Adaptive Cruise Control (CACC). In CACC, individual vehicles, grouped into platoons, must automatically adjust their own speed using on-board sensors and communication with the preceding vehicle so as to maintain a safe inter-vehicle distance. However, a crucial limitation of... View full abstract»

• ### A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Publication Year: 2017, Page(s):37 - 48
| | PDF (392 KB) | HTML

Distributed cyberphysical systems depend on secure wireless ad hoc networks to ensure that the sensors, controllers, and actuators (or nodes) in the system can reliably communicate. Such networks are difficult to design because, being inherently complex, they are vulnerable to attack. As a result, the current process of designing secure protocols for wireless ad hoc networks is effectively an arms... View full abstract»

• ### Éminence Grise Coalitions: On the Shaping of Public Opinion

Publication Year: 2017, Page(s):133 - 145
Cited by:  Papers (1)
| | PDF (418 KB) | HTML

We consider an opinion network of multiple individuals with dynamics evolving via a general time-varying continuous time consensus algorithm. In such a network, a subset of individuals forms an éminence grise coalition (EGC) if the individuals in that subset are capable of leading the entire network to agreeing on any desired opinion through a cooperative choice of their own initial opinio... View full abstract»

• ### Optimal Design of Switched Networks of Positive Linear Systems via Geometric Programming

Publication Year: 2017, Page(s):213 - 222
Cited by:  Papers (2)
| | PDF (907 KB) | HTML

In this paper, we propose an optimization framework to design a network of positive linear systems whose structure switches according to a Markov process. The optimization framework herein proposed allows the network designer to optimize the coupling elements of a directed network, as well as the dynamics of the nodes in order to maximize the stabilization rate of the network and/or the disturbanc... View full abstract»

• ### Harnessing Smoothness to Accelerate Distributed Optimization

Publication Year: 2017, Page(s): 1
| | PDF (1164 KB)

There has been a growing effort in studying the distributed optimization problem over a network. The objective is to optimize a global function formed by a sum of local functions, using only local computation and communication. Literature has developed consensus-based distributed (sub)gradient descent (DGD) methods and has shown that they have the same convergence rate \$Oleft({log t... View full abstract»

• ### Optimal Network Control With Stochastic Link Variations and Indefinite Quadratic Constraints

Publication Year: 2017, Page(s):259 - 266
| | PDF (172 KB) | HTML

In this paper, we consider the problem of optimal control of a network with stochastic links modeled as multiplicative noise with given second moments and arbitrary probability distributions. Additional quadratic constraints are imposed, where the quadratic forms may be indefinite and, thus, not necessarily convex. We show that the problem can be transformed to a semidefinite program. The optimiza... View full abstract»

• ### Detection against Linear Deception Attacks on Multi-sensor Remote State Estimation

Publication Year: 2017, Page(s): 1
| | PDF (1302 KB)

In this paper, a security problem in cyber-physical systems (CPS) is studied. A remote state estimation process using multiple sensors is considered. The measurement innovation packets from each sensor, which may be modified by a malicious attacker, are sent to a remote fusion center through wireless communication channels. To avoid being detected by typical bad data detectors at the remote estima... View full abstract»

• ### Event-Triggered Pinning Control of Switching Networks

Publication Year: 2015, Page(s):204 - 213
Cited by:  Papers (10)
| | PDF (1181 KB) | HTML

This paper investigates event-triggered pinning control for the synchronization of complex networks of nonlinear dynamical systems. We consider networks described by time-varying weighted graphs and featuring generic linear interaction protocols. Sufficient conditions for the absence of Zeno behavior are derived and exponential convergence of a global normed error function is proven. Static networ... View full abstract»

• ### Distributed Finite-Time Average Consensus in Digraphs in the Presence of Time Delays

Publication Year: 2015, Page(s):370 - 381
Cited by:  Papers (3)
| | PDF (1426 KB) | HTML

Most algorithms for distributed averaging only guarantee asymptotic convergence. This paper introduces a distributed protocol that allows nodes to find the exact average of the initial values in a finite and minimum number of steps on interconnection topologies described by strongly connected directed graphs (digraphs). More specifically, under the assumption that each component has knowledge of t... View full abstract»

• ### Fast Convergence in Semianonymous Potential Games

Publication Year: 2017, Page(s):246 - 258
| | PDF (554 KB) | HTML

Log-linear learning has been extensively studied in the game-theoretic and distributed control literature. It is appealing for many applications because it often guarantees that the agents' collective behavior will converge in probability to the optimal system configuration. However, the worst case convergence time can be prohibitively long, that is, exponential in the number of players. Building ... View full abstract»

• ### Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

Publication Year: 2017, Page(s): 1
| | PDF (1649 KB)

This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS's detection statistic. We formulate a linear quadratic... View full abstract»

• ### State observation and sensor selection for nonlinear networks

Publication Year: 2017, Page(s): 1
| | PDF (1236 KB)

A large variety of dynamical systems, such as chemical and biomolecular systems, can be seen as networks of nonlinear entities. Prediction, control, and identification of such nonlinear networks require knowledge of the state of the system. However, network states are usually unknown, and only a fraction of the state variables are directly measurable. The observability problem concerns reconstruct... View full abstract»

• ### Information Exchange and Decision Making in Micro Aerial Vehicle Networks for Cooperative Search

Publication Year: 2015, Page(s):335 - 347
Cited by:  Papers (3)
| | PDF (736 KB) | HTML

This paper considers a network of autonomous micro aerial vehicles (MAVs) cooperatively searching for multiple stationary targets. The objective is to minimize the search time while considering sensing and communication limitations. We derive limits for the required number of sensor observations considering false alarms and misdetections, to declare the existence or absence of a target. To minimiz... View full abstract»

## Aims & Scope

The IEEE Transactions on Control of Network Systems is committed to the timely publication of high-impact papers at the intersection of control systems and network science.

Full Aims & Scope

## Meet Our Editors

Editor-in-Chief
Ioannis Ch. Paschalidis
Boston University