Authentication of cyber-physical systems under learning-based attacks
Saved in:
Published in | IFAC-PapersOnLine Vol. 52; no. 20; pp. 369 - 374 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
2019
|
Online Access | Get full text |
ISSN | 2405-8963 2405-8963 |
DOI | 10.1016/j.ifacol.2019.12.183 |
Cover
Author | Franceschetti, Massimo Khojasteh, Mohammad Javad Khina, Anatoly Javidi, Tara |
---|---|
Author_xml | – sequence: 1 givenname: Mohammad Javad surname: Khojasteh fullname: Khojasteh, Mohammad Javad – sequence: 2 givenname: Anatoly surname: Khina fullname: Khina, Anatoly – sequence: 3 givenname: Massimo surname: Franceschetti fullname: Franceschetti, Massimo – sequence: 4 givenname: Tara surname: Javidi fullname: Javidi, Tara |
BookMark | eNp9kLFOwzAURS1UJErpHzDkBxJsx7FjtqoqFKkSC8zWi_1CXdKkst0hf09LGRAD07t60rnSPbdk0g89EnLPaMEokw-7wrdgh67glOmC8YLV5RWZckGrvNaynPzKN2Qe445SyrUUStdTsloc0xb75C0kP_TZ0GZ2bDDkh-0YT88ui2NMuI_ZsXcYsg4h9L7_yBuI6DJICexnvCPXLXQR5z93Rt6fVm_Ldb55fX5ZLja55VqlXFfKUWm1Uti0NUBdU21dpQB56xwy1QBvpGBUgUQruK6gQVVaoawTgslyRsSl14YhxoCtOQS_hzAaRs3ZhtmZiw1ztmEYNycbJ-zxD2Z9-t6bAvjuf_gLelBsBA |
CitedBy_id | crossref_primary_10_1109_TCNS_2020_3028035 crossref_primary_10_1109_ACCESS_2022_3189998 crossref_primary_10_3390_s22145168 crossref_primary_10_1016_j_ejcon_2021_06_012 crossref_primary_10_1088_1757_899X_1047_1_012050 |
Cites_doi | 10.2514/6.2019-2338 10.1109/ACC.2016.7524932 10.1109/JPROC.2016.2575064 10.1109/CDC.2018.8618862 10.1109/ALLERTON.2010.5706895 10.1145/2976749.2978388 10.1016/j.automatica.2017.04.047 10.3182/20110828-6-IT-1002.01721 10.1109/ASCC.2017.8287297 10.1109/CDC.2016.7798915 10.1109/CDC.2015.7403134 10.23919/ACC.2018.8431891 10.1214/aos/1176345697 10.1109/TAC.2017.2741778 10.1109/MCS.2014.2364724 10.1109/TAC.2013.2279896 10.23919/ACC.2018.8431569 10.1109/TAC.2017.2714646 10.1109/TCNS.2016.2613445 10.1109/TASE.2014.2376492 10.1109/MCS.2014.2364708 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1016/j.ifacol.2019.12.183 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2405-8963 |
EndPage | 374 |
ExternalDocumentID | 10_1016_j_ifacol_2019_12_183 |
GroupedDBID | 0R~ 457 AALRI AAXUO AAYWO AAYXX ABMAC ACGFS ADBBV ADVLN AEXQZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ ATDSJ CITATION EBS EJD FDB HX~ KQ8 O9- ROL |
ID | FETCH-LOGICAL-c297t-957d06c977ebf8aa8809cd57ae2fdde17ba2b64107a6ec4295abe73c47cd44163 |
ISSN | 2405-8963 |
IngestDate | Wed Oct 01 05:10:01 EDT 2025 Thu Apr 24 22:52:06 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 20 |
Language | English |
License | https://www.elsevier.com/tdm/userlicense/1.0 |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c297t-957d06c977ebf8aa8809cd57ae2fdde17ba2b64107a6ec4295abe73c47cd44163 |
OpenAccessLink | https://doi.org/10.1016/j.ifacol.2019.12.183 |
PageCount | 6 |
ParticipantIDs | crossref_primary_10_1016_j_ifacol_2019_12_183 crossref_citationtrail_10_1016_j_ifacol_2019_12_183 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-00-00 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – year: 2019 text: 2019-00-00 |
PublicationDecade | 2010 |
PublicationTitle | IFAC-PapersOnLine |
PublicationYear | 2019 |
References | 10.1016/j.ifacol.2019.12.183_bib30 Bertsekas (10.1016/j.ifacol.2019.12.183_bib2) 1995 Chen (10.1016/j.ifacol.2019.12.183_bib3) 2018; 63 10.1016/j.ifacol.2019.12.183_bib18 10.1016/j.ifacol.2019.12.183_bib19 10.1016/j.ifacol.2019.12.183_bib12 10.1016/j.ifacol.2019.12.183_bib10 10.1016/j.ifacol.2019.12.183_bib11 10.1016/j.ifacol.2019.12.183_bib16 10.1016/j.ifacol.2019.12.183_bib14 Bai (10.1016/j.ifacol.2019.12.183_bib1) 2017; 82 10.1016/j.ifacol.2019.12.183_bib15 Zhu (10.1016/j.ifacol.2019.12.183_bib31) 2014; 59 Shoukry (10.1016/j.ifacol.2019.12.183_bib25) 2018; 2 10.1016/j.ifacol.2019.12.183_bib20 Mo (10.1016/j.ifacol.2019.12.183_bib17) 2015; 35 Dolk (10.1016/j.ifacol.2019.12.183_bib6) 2017; 4 Kehoe (10.1016/j.ifacol.2019.12.183_bib13) 2015; 12 10.1016/j.ifacol.2019.12.183_bib7 10.1016/j.ifacol.2019.12.183_bib29 10.1016/j.ifacol.2019.12.183_bib5 10.1016/j.ifacol.2019.12.183_bib4 Sandberg (10.1016/j.ifacol.2019.12.183_bib21) 2015; 35 10.1016/j.ifacol.2019.12.183_bib23 10.1016/j.ifacol.2019.12.183_bib22 Shi (10.1016/j.ifacol.2019.12.183_bib24) 2018; 63 10.1016/j.ifacol.2019.12.183_bib27 10.1016/j.ifacol.2019.12.183_bib28 Durrett (10.1016/j.ifacol.2019.12.183_bib8) 2010 10.1016/j.ifacol.2019.12.183_bib9 10.1016/j.ifacol.2019.12.183_bib26 |
References_xml | – ident: 10.1016/j.ifacol.2019.12.183_bib7 – ident: 10.1016/j.ifacol.2019.12.183_bib10 doi: 10.2514/6.2019-2338 – ident: 10.1016/j.ifacol.2019.12.183_bib12 doi: 10.1109/ACC.2016.7524932 – ident: 10.1016/j.ifacol.2019.12.183_bib23 doi: 10.1109/JPROC.2016.2575064 – ident: 10.1016/j.ifacol.2019.12.183_bib5 doi: 10.1109/CDC.2018.8618862 – ident: 10.1016/j.ifacol.2019.12.183_bib19 doi: 10.1109/ALLERTON.2010.5706895 – ident: 10.1016/j.ifacol.2019.12.183_bib29 doi: 10.1145/2976749.2978388 – volume: 82 start-page: 251 year: 2017 ident: 10.1016/j.ifacol.2019.12.183_bib1 article-title: Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs publication-title: Automatica doi: 10.1016/j.automatica.2017.04.047 – year: 1995 ident: 10.1016/j.ifacol.2019.12.183_bib2 – ident: 10.1016/j.ifacol.2019.12.183_bib27 – ident: 10.1016/j.ifacol.2019.12.183_bib26 doi: 10.3182/20110828-6-IT-1002.01721 – ident: 10.1016/j.ifacol.2019.12.183_bib9 doi: 10.1109/ASCC.2017.8287297 – ident: 10.1016/j.ifacol.2019.12.183_bib4 doi: 10.1109/CDC.2016.7798915 – ident: 10.1016/j.ifacol.2019.12.183_bib30 doi: 10.1109/CDC.2015.7403134 – year: 2010 ident: 10.1016/j.ifacol.2019.12.183_bib8 – ident: 10.1016/j.ifacol.2019.12.183_bib20 doi: 10.23919/ACC.2018.8431891 – ident: 10.1016/j.ifacol.2019.12.183_bib15 doi: 10.1214/aos/1176345697 – volume: 63 start-page: 1418 issue: 5 year: 2018 ident: 10.1016/j.ifacol.2019.12.183_bib3 article-title: Cyber-physical attacks with control objectives publication-title: IEEE Tran. Auto. Cont. doi: 10.1109/TAC.2017.2741778 – volume: 35 start-page: 93 issue: 1 year: 2015 ident: 10.1016/j.ifacol.2019.12.183_bib17 article-title: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs publication-title: IEEE Control Systems doi: 10.1109/MCS.2014.2364724 – volume: 59 start-page: 804 issue: 3 year: 2014 ident: 10.1016/j.ifacol.2019.12.183_bib31 article-title: On the performance analysis of resilient networked control systems under replay attacks publication-title: IEEE Tran. Auto. Cont. doi: 10.1109/TAC.2013.2279896 – ident: 10.1016/j.ifacol.2019.12.183_bib22 – ident: 10.1016/j.ifacol.2019.12.183_bib11 doi: 10.23919/ACC.2018.8431569 – volume: 2 start-page: 5 issue: 1 year: 2018 ident: 10.1016/j.ifacol.2019.12.183_bib25 article-title: SMT-based observer design for cyber-physical systems under sensor attacks publication-title: ACM Trans. on CPS – ident: 10.1016/j.ifacol.2019.12.183_bib28 – volume: 63 start-page: 386 issue: 2 year: 2018 ident: 10.1016/j.ifacol.2019.12.183_bib24 article-title: Causality countermeasures for anomaly detection in cyber-physical systems publication-title: IEEE Tran. Auto. Cont. doi: 10.1109/TAC.2017.2714646 – ident: 10.1016/j.ifacol.2019.12.183_bib14 – volume: 4 start-page: 93 issue: 1 year: 2017 ident: 10.1016/j.ifacol.2019.12.183_bib6 article-title: Event-triggered control systems under denial-of-service attacks publication-title: IEEE Tran. Cont. Net. Sys. doi: 10.1109/TCNS.2016.2613445 – volume: 12 start-page: 398 issue: 2 year: 2015 ident: 10.1016/j.ifacol.2019.12.183_bib13 article-title: A survey of research on cloud robotics and automation publication-title: IEEE Tran. on auto. science and eng. doi: 10.1109/TASE.2014.2376492 – ident: 10.1016/j.ifacol.2019.12.183_bib18 – ident: 10.1016/j.ifacol.2019.12.183_bib16 – volume: 35 start-page: 20 issue: 1 year: 2015 ident: 10.1016/j.ifacol.2019.12.183_bib21 article-title: Cyber-physical security in networked control systems: An introduction to the issue publication-title: IEEE Control Systems doi: 10.1109/MCS.2014.2364708 |
SSID | ssj0002964798 |
Score | 1.8340837 |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 369 |
Title | Authentication of cyber-physical systems under learning-based attacks |
Volume | 52 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2405-8963 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002964798 issn: 2405-8963 databaseCode: KQ8 dateStart: 20150101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6FcuGCigqi0CIfuFUbxevHxscoalUKKSClUm_W7HpMG1EnCg4SXPnjnX3YcUhVtb1YyWY9ij2jmW9nvt1h7KMegKDIIzmmWPAYC-BKmYwYJnQLxEraiunkPD29iM8uk8te71-HtbSqVV__vXNfyVO0SmOkV7NL9hGabYXSAH0m_dKVNEzXB-nY5LcM20e3uE__Ubjki-blu3Oaf9lmt8umQ8QPbkJXcQR1bTbYd-Hpp5PRmH-DBWHCr9WXTsn989V8BiTLJmEm8yu4uYHi6Ax-Q7Gecu32l40qWsivWaK2dQfSIhprRx2YEF4nC2m5O4ZVb3-YwhK6WQjv5aybIkiQ8GHm3RTeMeb9bCI69iQGHa8ZuW4tPgBHrm3Plm93aYZZ_7o0B3obVl5mMrnhMFrHsqZ-_1-Ia4mHDadtljspuZGShyInKc_YcyEJrpjK_vdhm6gzdWlpeyq3T9VswbQ8we2_04E4Hawy3WUv_SIjGDmLecV6WO2x401rCeZlsGktgbeWwFpLsGktgbeW1-zi5Hg6PuW-iQbXIpM1zxJZDFJNMB9VOQQgf53pIpGAoqTQFkoFQqVxOJCQoiZ0koBCGelY6iI2aP0N26nmFb5lQahpKYYYKplAXAoBqCSWpc5IoNQg9lnUPHeu_QnzptHJz_y-177PeHvXwp2wcu_8d4-c_569MN9c2uyA7dTLFR4SkKzVB6voW2hSeCc |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Authentication+of+cyber-physical+systems+under+learning-based+attacks&rft.jtitle=IFAC-PapersOnLine&rft.au=Khojasteh%2C+Mohammad+Javad&rft.au=Khina%2C+Anatoly&rft.au=Franceschetti%2C+Massimo&rft.au=Javidi%2C+Tara&rft.date=2019&rft.issn=2405-8963&rft.eissn=2405-8963&rft.volume=52&rft.issue=20&rft.spage=369&rft.epage=374&rft_id=info:doi/10.1016%2Fj.ifacol.2019.12.183&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ifacol_2019_12_183 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2405-8963&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2405-8963&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2405-8963&client=summon |