Authentication of cyber-physical systems under learning-based attacks

Saved in:
Bibliographic Details
Published inIFAC-PapersOnLine Vol. 52; no. 20; pp. 369 - 374
Main Authors Khojasteh, Mohammad Javad, Khina, Anatoly, Franceschetti, Massimo, Javidi, Tara
Format Journal Article
LanguageEnglish
Published 2019
Online AccessGet full text
ISSN2405-8963
2405-8963
DOI10.1016/j.ifacol.2019.12.183

Cover

Author Franceschetti, Massimo
Khojasteh, Mohammad Javad
Khina, Anatoly
Javidi, Tara
Author_xml – sequence: 1
  givenname: Mohammad Javad
  surname: Khojasteh
  fullname: Khojasteh, Mohammad Javad
– sequence: 2
  givenname: Anatoly
  surname: Khina
  fullname: Khina, Anatoly
– sequence: 3
  givenname: Massimo
  surname: Franceschetti
  fullname: Franceschetti, Massimo
– sequence: 4
  givenname: Tara
  surname: Javidi
  fullname: Javidi, Tara
BookMark eNp9kLFOwzAURS1UJErpHzDkBxJsx7FjtqoqFKkSC8zWi_1CXdKkst0hf09LGRAD07t60rnSPbdk0g89EnLPaMEokw-7wrdgh67glOmC8YLV5RWZckGrvNaynPzKN2Qe445SyrUUStdTsloc0xb75C0kP_TZ0GZ2bDDkh-0YT88ui2NMuI_ZsXcYsg4h9L7_yBuI6DJICexnvCPXLXQR5z93Rt6fVm_Ldb55fX5ZLja55VqlXFfKUWm1Uti0NUBdU21dpQB56xwy1QBvpGBUgUQruK6gQVVaoawTgslyRsSl14YhxoCtOQS_hzAaRs3ZhtmZiw1ztmEYNycbJ-zxD2Z9-t6bAvjuf_gLelBsBA
CitedBy_id crossref_primary_10_1109_TCNS_2020_3028035
crossref_primary_10_1109_ACCESS_2022_3189998
crossref_primary_10_3390_s22145168
crossref_primary_10_1016_j_ejcon_2021_06_012
crossref_primary_10_1088_1757_899X_1047_1_012050
Cites_doi 10.2514/6.2019-2338
10.1109/ACC.2016.7524932
10.1109/JPROC.2016.2575064
10.1109/CDC.2018.8618862
10.1109/ALLERTON.2010.5706895
10.1145/2976749.2978388
10.1016/j.automatica.2017.04.047
10.3182/20110828-6-IT-1002.01721
10.1109/ASCC.2017.8287297
10.1109/CDC.2016.7798915
10.1109/CDC.2015.7403134
10.23919/ACC.2018.8431891
10.1214/aos/1176345697
10.1109/TAC.2017.2741778
10.1109/MCS.2014.2364724
10.1109/TAC.2013.2279896
10.23919/ACC.2018.8431569
10.1109/TAC.2017.2714646
10.1109/TCNS.2016.2613445
10.1109/TASE.2014.2376492
10.1109/MCS.2014.2364708
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1016/j.ifacol.2019.12.183
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 2405-8963
EndPage 374
ExternalDocumentID 10_1016_j_ifacol_2019_12_183
GroupedDBID 0R~
457
AALRI
AAXUO
AAYWO
AAYXX
ABMAC
ACGFS
ADBBV
ADVLN
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ATDSJ
CITATION
EBS
EJD
FDB
HX~
KQ8
O9-
ROL
ID FETCH-LOGICAL-c297t-957d06c977ebf8aa8809cd57ae2fdde17ba2b64107a6ec4295abe73c47cd44163
ISSN 2405-8963
IngestDate Wed Oct 01 05:10:01 EDT 2025
Thu Apr 24 22:52:06 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 20
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c297t-957d06c977ebf8aa8809cd57ae2fdde17ba2b64107a6ec4295abe73c47cd44163
OpenAccessLink https://doi.org/10.1016/j.ifacol.2019.12.183
PageCount 6
ParticipantIDs crossref_primary_10_1016_j_ifacol_2019_12_183
crossref_citationtrail_10_1016_j_ifacol_2019_12_183
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-00-00
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 2019-00-00
PublicationDecade 2010
PublicationTitle IFAC-PapersOnLine
PublicationYear 2019
References 10.1016/j.ifacol.2019.12.183_bib30
Bertsekas (10.1016/j.ifacol.2019.12.183_bib2) 1995
Chen (10.1016/j.ifacol.2019.12.183_bib3) 2018; 63
10.1016/j.ifacol.2019.12.183_bib18
10.1016/j.ifacol.2019.12.183_bib19
10.1016/j.ifacol.2019.12.183_bib12
10.1016/j.ifacol.2019.12.183_bib10
10.1016/j.ifacol.2019.12.183_bib11
10.1016/j.ifacol.2019.12.183_bib16
10.1016/j.ifacol.2019.12.183_bib14
Bai (10.1016/j.ifacol.2019.12.183_bib1) 2017; 82
10.1016/j.ifacol.2019.12.183_bib15
Zhu (10.1016/j.ifacol.2019.12.183_bib31) 2014; 59
Shoukry (10.1016/j.ifacol.2019.12.183_bib25) 2018; 2
10.1016/j.ifacol.2019.12.183_bib20
Mo (10.1016/j.ifacol.2019.12.183_bib17) 2015; 35
Dolk (10.1016/j.ifacol.2019.12.183_bib6) 2017; 4
Kehoe (10.1016/j.ifacol.2019.12.183_bib13) 2015; 12
10.1016/j.ifacol.2019.12.183_bib7
10.1016/j.ifacol.2019.12.183_bib29
10.1016/j.ifacol.2019.12.183_bib5
10.1016/j.ifacol.2019.12.183_bib4
Sandberg (10.1016/j.ifacol.2019.12.183_bib21) 2015; 35
10.1016/j.ifacol.2019.12.183_bib23
10.1016/j.ifacol.2019.12.183_bib22
Shi (10.1016/j.ifacol.2019.12.183_bib24) 2018; 63
10.1016/j.ifacol.2019.12.183_bib27
10.1016/j.ifacol.2019.12.183_bib28
Durrett (10.1016/j.ifacol.2019.12.183_bib8) 2010
10.1016/j.ifacol.2019.12.183_bib9
10.1016/j.ifacol.2019.12.183_bib26
References_xml – ident: 10.1016/j.ifacol.2019.12.183_bib7
– ident: 10.1016/j.ifacol.2019.12.183_bib10
  doi: 10.2514/6.2019-2338
– ident: 10.1016/j.ifacol.2019.12.183_bib12
  doi: 10.1109/ACC.2016.7524932
– ident: 10.1016/j.ifacol.2019.12.183_bib23
  doi: 10.1109/JPROC.2016.2575064
– ident: 10.1016/j.ifacol.2019.12.183_bib5
  doi: 10.1109/CDC.2018.8618862
– ident: 10.1016/j.ifacol.2019.12.183_bib19
  doi: 10.1109/ALLERTON.2010.5706895
– ident: 10.1016/j.ifacol.2019.12.183_bib29
  doi: 10.1145/2976749.2978388
– volume: 82
  start-page: 251
  year: 2017
  ident: 10.1016/j.ifacol.2019.12.183_bib1
  article-title: Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.04.047
– year: 1995
  ident: 10.1016/j.ifacol.2019.12.183_bib2
– ident: 10.1016/j.ifacol.2019.12.183_bib27
– ident: 10.1016/j.ifacol.2019.12.183_bib26
  doi: 10.3182/20110828-6-IT-1002.01721
– ident: 10.1016/j.ifacol.2019.12.183_bib9
  doi: 10.1109/ASCC.2017.8287297
– ident: 10.1016/j.ifacol.2019.12.183_bib4
  doi: 10.1109/CDC.2016.7798915
– ident: 10.1016/j.ifacol.2019.12.183_bib30
  doi: 10.1109/CDC.2015.7403134
– year: 2010
  ident: 10.1016/j.ifacol.2019.12.183_bib8
– ident: 10.1016/j.ifacol.2019.12.183_bib20
  doi: 10.23919/ACC.2018.8431891
– ident: 10.1016/j.ifacol.2019.12.183_bib15
  doi: 10.1214/aos/1176345697
– volume: 63
  start-page: 1418
  issue: 5
  year: 2018
  ident: 10.1016/j.ifacol.2019.12.183_bib3
  article-title: Cyber-physical attacks with control objectives
  publication-title: IEEE Tran. Auto. Cont.
  doi: 10.1109/TAC.2017.2741778
– volume: 35
  start-page: 93
  issue: 1
  year: 2015
  ident: 10.1016/j.ifacol.2019.12.183_bib17
  article-title: Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs
  publication-title: IEEE Control Systems
  doi: 10.1109/MCS.2014.2364724
– volume: 59
  start-page: 804
  issue: 3
  year: 2014
  ident: 10.1016/j.ifacol.2019.12.183_bib31
  article-title: On the performance analysis of resilient networked control systems under replay attacks
  publication-title: IEEE Tran. Auto. Cont.
  doi: 10.1109/TAC.2013.2279896
– ident: 10.1016/j.ifacol.2019.12.183_bib22
– ident: 10.1016/j.ifacol.2019.12.183_bib11
  doi: 10.23919/ACC.2018.8431569
– volume: 2
  start-page: 5
  issue: 1
  year: 2018
  ident: 10.1016/j.ifacol.2019.12.183_bib25
  article-title: SMT-based observer design for cyber-physical systems under sensor attacks
  publication-title: ACM Trans. on CPS
– ident: 10.1016/j.ifacol.2019.12.183_bib28
– volume: 63
  start-page: 386
  issue: 2
  year: 2018
  ident: 10.1016/j.ifacol.2019.12.183_bib24
  article-title: Causality countermeasures for anomaly detection in cyber-physical systems
  publication-title: IEEE Tran. Auto. Cont.
  doi: 10.1109/TAC.2017.2714646
– ident: 10.1016/j.ifacol.2019.12.183_bib14
– volume: 4
  start-page: 93
  issue: 1
  year: 2017
  ident: 10.1016/j.ifacol.2019.12.183_bib6
  article-title: Event-triggered control systems under denial-of-service attacks
  publication-title: IEEE Tran. Cont. Net. Sys.
  doi: 10.1109/TCNS.2016.2613445
– volume: 12
  start-page: 398
  issue: 2
  year: 2015
  ident: 10.1016/j.ifacol.2019.12.183_bib13
  article-title: A survey of research on cloud robotics and automation
  publication-title: IEEE Tran. on auto. science and eng.
  doi: 10.1109/TASE.2014.2376492
– ident: 10.1016/j.ifacol.2019.12.183_bib18
– ident: 10.1016/j.ifacol.2019.12.183_bib16
– volume: 35
  start-page: 20
  issue: 1
  year: 2015
  ident: 10.1016/j.ifacol.2019.12.183_bib21
  article-title: Cyber-physical security in networked control systems: An introduction to the issue
  publication-title: IEEE Control Systems
  doi: 10.1109/MCS.2014.2364708
SSID ssj0002964798
Score 1.8340837
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 369
Title Authentication of cyber-physical systems under learning-based attacks
Volume 52
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2405-8963
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002964798
  issn: 2405-8963
  databaseCode: KQ8
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6FcuGCigqi0CIfuFUbxevHxscoalUKKSClUm_W7HpMG1EnCg4SXPnjnX3YcUhVtb1YyWY9ij2jmW9nvt1h7KMegKDIIzmmWPAYC-BKmYwYJnQLxEraiunkPD29iM8uk8te71-HtbSqVV__vXNfyVO0SmOkV7NL9hGabYXSAH0m_dKVNEzXB-nY5LcM20e3uE__Ubjki-blu3Oaf9lmt8umQ8QPbkJXcQR1bTbYd-Hpp5PRmH-DBWHCr9WXTsn989V8BiTLJmEm8yu4uYHi6Ax-Q7Gecu32l40qWsivWaK2dQfSIhprRx2YEF4nC2m5O4ZVb3-YwhK6WQjv5aybIkiQ8GHm3RTeMeb9bCI69iQGHa8ZuW4tPgBHrm3Plm93aYZZ_7o0B3obVl5mMrnhMFrHsqZ-_1-Ia4mHDadtljspuZGShyInKc_YcyEJrpjK_vdhm6gzdWlpeyq3T9VswbQ8we2_04E4Hawy3WUv_SIjGDmLecV6WO2x401rCeZlsGktgbeWwFpLsGktgbeW1-zi5Hg6PuW-iQbXIpM1zxJZDFJNMB9VOQQgf53pIpGAoqTQFkoFQqVxOJCQoiZ0koBCGelY6iI2aP0N26nmFb5lQahpKYYYKplAXAoBqCSWpc5IoNQg9lnUPHeu_QnzptHJz_y-177PeHvXwp2wcu_8d4-c_569MN9c2uyA7dTLFR4SkKzVB6voW2hSeCc
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Authentication+of+cyber-physical+systems+under+learning-based+attacks&rft.jtitle=IFAC-PapersOnLine&rft.au=Khojasteh%2C+Mohammad+Javad&rft.au=Khina%2C+Anatoly&rft.au=Franceschetti%2C+Massimo&rft.au=Javidi%2C+Tara&rft.date=2019&rft.issn=2405-8963&rft.eissn=2405-8963&rft.volume=52&rft.issue=20&rft.spage=369&rft.epage=374&rft_id=info:doi/10.1016%2Fj.ifacol.2019.12.183&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_ifacol_2019_12_183
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2405-8963&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2405-8963&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2405-8963&client=summon