{"id":"https://openalex.org/W1921014301","doi":"https://doi.org/10.1093/imamci/dnv026","title":"An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach","display_name":"An application of linear algebra theory in networked control systems: stochastic cyber-attacks detection approach","publication_year":2015,"publication_date":"2015-06-10","ids":{"openalex":"https://openalex.org/W1921014301","doi":"https://doi.org/10.1093/imamci/dnv026","mag":"1921014301"},"language":"en","primary_location":{"id":"doi:10.1093/imamci/dnv026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/imamci/dnv026","pdf_url":"https://academic.oup.com/imamci/article-pdf/33/4/1081/8706181/dnv026.pdf","source":{"id":"https://openalex.org/S162756791","display_name":"IMA Journal of Mathematical Control and Information","issn_l":"0265-0754","issn":["0265-0754","1471-6887"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IMA Journal of Mathematical Control and Information","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://academic.oup.com/imamci/article-pdf/33/4/1081/8706181/dnv026.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100614493","display_name":"Yumei Li","orcid":"https://orcid.org/0000-0002-0591-5061"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Yumei Li","raw_affiliation_strings":["Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721 Luxembourg","Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721 Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049772606","display_name":"Holger Voos","orcid":"https://orcid.org/0000-0002-9600-8386"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Holger Voos","raw_affiliation_strings":["Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721 Luxembourg","Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721 Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security Reliability and Trust (SnT), University of Luxembourg, L-2721, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031918402","display_name":"Mohamed Darouach","orcid":"https://orcid.org/0000-0003-2298-2124"},"institutions":[{"id":"https://openalex.org/I4210110792","display_name":"Centre de Recherche en Automatique de Nancy","ror":"https://ror.org/022r5hc56","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I4210099203","https://openalex.org/I4210100260","https://openalex.org/I4210110792","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Mohamed Darouach","raw_affiliation_strings":["Centre de la Recherche en Automatique de Nancy (CRAN), Universite de Lorraine, Longwy, France"],"affiliations":[{"raw_affiliation_string":"Centre de la Recherche en Automatique de Nancy (CRAN), Universite de Lorraine, Longwy, France","institution_ids":["https://openalex.org/I4210110792","https://openalex.org/I90183372"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100380201","display_name":"Changchun Hua","orcid":"https://orcid.org/0000-0001-6311-2112"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]},{"id":"https://openalex.org/I4210128819","display_name":"Institute of Electrical Engineering","ror":"https://ror.org/033js6g46","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128819"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changchun Hua","raw_affiliation_strings":["Institute of Electrical Engineering Yanshan University, Qinhuangdao, China","Institute of Electrical Engineering Yanshan University  Qinhuangdao China"],"affiliations":[{"raw_affiliation_string":"Institute of Electrical Engineering Yanshan University, Qinhuangdao, China","institution_ids":["https://openalex.org/I39333907","https://openalex.org/I4210128819"]},{"raw_affiliation_string":"Institute of Electrical Engineering Yanshan University  Qinhuangdao China","institution_ids":["https://openalex.org/I39333907","https://openalex.org/I4210128819"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100614493"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":{"value":2582,"currency":"GBP","value_usd":3167},"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.06222393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"33","issue":"4","first_page":"1081","last_page":"1102"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10621","display_name":"Gene Regulatory Network Analysis","score":0.9743000268936157,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6180191040039062},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.536401629447937},{"id":"https://openalex.org/keywords/stochastic-process","display_name":"Stochastic process","score":0.5124797821044922},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4856061339378357},{"id":"https://openalex.org/keywords/linear-system","display_name":"Linear system","score":0.47119852900505066},{"id":"https://openalex.org/keywords/process-calculus","display_name":"Process calculus","score":0.4600311517715454},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.42994117736816406},{"id":"https://openalex.org/keywords/residual","display_name":"Residual","score":0.4292845129966736},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37464389204978943},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24922698736190796},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2257620096206665},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09893891215324402}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6180191040039062},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.536401629447937},{"id":"https://openalex.org/C8272713","wikidata":"https://www.wikidata.org/wiki/Q176737","display_name":"Stochastic process","level":2,"score":0.5124797821044922},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4856061339378357},{"id":"https://openalex.org/C6802819","wikidata":"https://www.wikidata.org/wiki/Q1072174","display_name":"Linear system","level":2,"score":0.47119852900505066},{"id":"https://openalex.org/C161771561","wikidata":"https://www.wikidata.org/wiki/Q1970286","display_name":"Process calculus","level":2,"score":0.4600311517715454},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.42994117736816406},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.4292845129966736},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37464389204978943},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24922698736190796},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2257620096206665},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09893891215324402},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1093/imamci/dnv026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/imamci/dnv026","pdf_url":"https://academic.oup.com/imamci/article-pdf/33/4/1081/8706181/dnv026.pdf","source":{"id":"https://openalex.org/S162756791","display_name":"IMA Journal of Mathematical Control and Information","issn_l":"0265-0754","issn":["0265-0754","1471-6887"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IMA Journal of Mathematical Control and Information","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-01246542v1","is_oa":false,"landing_page_url":"https://hal.archives-ouvertes.fr/hal-01246542","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 0265-0754","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:HAL:hal-01246548v1","is_oa":false,"landing_page_url":"https://hal.science/hal-01246548","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IMA Journal of Mathematical Control and Information, 2016, 33 (4), pp.1081-1102. &#x27E8;10.1093/imamci/dnv026&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:open-archive.highwire.org:imamci:33/4/1081","is_oa":false,"landing_page_url":"http://imamci.oxfordjournals.org/cgi/content/short/33/4/1081","pdf_url":null,"source":{"id":"https://openalex.org/S4406923041","display_name":"HighWire Press Open Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"TEXT"},{"id":"pmh:oai:orbilu.uni.lu:10993/21816","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/21816","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IMA Journal of Mathematical Control and Information, 1-22 (2015-06-10)","raw_type":"peer reviewed"}],"best_oa_location":{"id":"doi:10.1093/imamci/dnv026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/imamci/dnv026","pdf_url":"https://academic.oup.com/imamci/article-pdf/33/4/1081/8706181/dnv026.pdf","source":{"id":"https://openalex.org/S162756791","display_name":"IMA Journal of Mathematical Control and Information","issn_l":"0265-0754","issn":["0265-0754","1471-6887"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IMA Journal of Mathematical Control and Information","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2885050210","display_name":null,"funder_award_id":"61273222","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1921014301.pdf","grobid_xml":"https://content.openalex.org/works/W1921014301.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W815108739","https://openalex.org/W1500549241","https://openalex.org/W1557652964","https://openalex.org/W1634196400","https://openalex.org/W1654636210","https://openalex.org/W1868559974","https://openalex.org/W1982965866","https://openalex.org/W1998960699","https://openalex.org/W2005028112","https://openalex.org/W2011284636","https://openalex.org/W2026092041","https://openalex.org/W2031006315","https://openalex.org/W2034356849","https://openalex.org/W2041587044","https://openalex.org/W2051054517","https://openalex.org/W2097055335","https://openalex.org/W2105075128","https://openalex.org/W2105582581","https://openalex.org/W2106972980","https://openalex.org/W2112668583","https://openalex.org/W2127035641","https://openalex.org/W2149756011","https://openalex.org/W2150436340","https://openalex.org/W2153775930","https://openalex.org/W2158469273","https://openalex.org/W2161409410","https://openalex.org/W2358211877","https://openalex.org/W3195133498","https://openalex.org/W6663513792"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W2209816623","https://openalex.org/W1987127708","https://openalex.org/W2170466294","https://openalex.org/W2132217355","https://openalex.org/W2123111774","https://openalex.org/W1511004497","https://openalex.org/W2142005831","https://openalex.org/W2014322972","https://openalex.org/W2112263892"],"abstract_inverted_index":{"Based":[0],"on":[1,38,80,126],"the":[2,10,60,68,81,91,101,110,127,139,142,179,193],"traditional":[3,169],"linear":[4,86],"algebra":[5,87],"theory,":[6,88],"this":[7,152,164],"paper":[8,153],"propose":[9,90],"attack":[11,70],"detection":[12,93,149,194],"schemes":[13,94],"for":[14,43,95],"networked":[15],"control":[16,128],"systems":[17],"(NCSs)":[18],"under":[19,45],"single":[20],"stochastic":[21,25,53,56,62,69,97,143],"cyber-attack":[22],"and":[23,85,124,135,157,198],"multiple":[24,29],"cyber-attacks":[26,57,144],"aiming":[27],"at":[28],"communication":[30],"channels":[31],"of":[32,52,141,163],"NCSs,":[33],"respectively.":[34],"The":[35,147,161,188],"focus":[36],"is":[37,116,166],"designing":[39],"an":[40],"anomaly":[41],"detector":[42,102],"NCSs":[44,54,73],"cyber-attacks.":[46,98],"First,":[47],"we":[48,65,89],"construct":[49],"a":[50],"model":[51],"with":[55],"which":[58],"satisfy":[59],"Markovian":[61],"process.":[63],"And":[64],"also":[66],"introduced":[67],"models":[71],"that":[72,115,176,192],"are":[74,130,145,154,186,196],"possibly":[75],"exposed":[76],"to.":[77],"Next,":[78],"based":[79],"frequency-domain":[82],"transformation":[83],"technique":[84],"algebraic":[92,106],"possible":[96],"We":[99],"transform":[100],"error":[103],"dynamics":[104],"into":[105],"equations.":[107],"By":[108],"applying":[109],"presented":[111,148],"approaches,":[112],"residual":[113],"information":[114],"caused":[117],"by":[118],"different":[119],"attacks":[120],"is,":[121],"respectively,":[122],"obtained":[123],"anomalies":[125],"system":[129],"detected.":[131],"In":[132],"addition,":[133],"sufficient":[134],"necessary":[136],"conditions":[137],"guaranteeing":[138],"detectability":[140],"obtained.":[146],"approaches":[150,195],"in":[151,200],"simple,":[155],"straightforward":[156],"easy":[158],"to":[159,167,172],"implement.":[160],"aim":[162],"work":[165],"use":[168],"mathematics":[170],"tools":[171],"solve":[173],"new":[174],"problems":[175],"arise":[177],"from":[178],"complex":[180],"NCSs.":[181],"Finally,":[182],"two":[183],"simulation":[184,189],"examples":[185],"provided.":[187],"results":[190],"underline":[191],"effective":[197],"feasible":[199],"practical":[201],"application.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
