Table 1 Upper bound of \(\varepsilon _2\) with different value of attack parameters.

From: Extended dissipative truncated predictive control strategy for conic-type delayed networked control systems affected by cyber attacks and sensor distortion

Parameters

\(\mathbf {C_1}\)

\(\mathbf {C_2}\)

\(\mathbf {C_3}\)

\(\mathbf {C_4}\)

\(\bar{\alpha }=0.5, \bar{\beta }=1\)

0.0763

0.1122

0.1124

0.0988

\(\bar{\alpha }=0.1, \bar{\beta }=0.1\)

0.0755

0.1116

0.1118

0.0982

\(\bar{\alpha }=0.5, \bar{\beta }=0.5\)

0.0759

0.1119

0.1121

0.0985

\(\bar{\alpha }=1, \bar{\beta }=1\)

0.0747

0.1110

0.1112

0.0975

\(\bar{\alpha }=0.5,\bar{\beta }=0\)

0.0742

0.1114

0.1116

0.0979