Abstract: This paper considers the problem of platooning control of connected automated vehicles under cyber-attacks. Specifically, the attacker aims to prevent the follower vehicle from maintaining a ...