{"id":"https://openalex.org/W2993500098","doi":"https://doi.org/10.1109/allerton.2019.8919762","title":"Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems","display_name":"Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2993500098","doi":"https://doi.org/10.1109/allerton.2019.8919762","mag":"2993500098"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2019.8919762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2019.8919762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058091799","display_name":"Mehdi Hosseinzadeh","orcid":"https://orcid.org/0000-0001-8318-7947"},"institutions":[{"id":"https://openalex.org/I132053463","display_name":"Universit\u00e9 Libre de Bruxelles","ror":"https://ror.org/01r9htc13","country_code":"BE","type":"education","lineage":["https://openalex.org/I132053463"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Mehdi Hosseinzadeh","raw_affiliation_strings":["Universit&#x00E8; Libre de Bruxelles (ULB),Service d&#x2019;Automatique et d&#x2019;Analyse des Syst&#x00E8;mes (SAAS),Brussels,Belgium","Service d'Automatique et d'Analyse des Syst\u00e8mes (SAAS), Universit\u00e8 Libre de Bruxelles (ULB), Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E8; Libre de Bruxelles (ULB),Service d&#x2019;Automatique et d&#x2019;Analyse des Syst&#x00E8;mes (SAAS),Brussels,Belgium","institution_ids":["https://openalex.org/I132053463"]},{"raw_affiliation_string":"Service d'Automatique et d'Analyse des Syst\u00e8mes (SAAS), Universit\u00e8 Libre de Bruxelles (ULB), Brussels, Belgium","institution_ids":["https://openalex.org/I132053463"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006051783","display_name":"Bruno Sinopoli","orcid":"https://orcid.org/0000-0001-5778-4879"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]},{"id":"https://openalex.org/I4210121589","display_name":"UCLouvain Saint-Louis Brussels","ror":"https://ror.org/02ygek028","country_code":"BE","type":"education","lineage":["https://openalex.org/I4210121589","https://openalex.org/I95674353"]}],"countries":["BE","US"],"is_corresponding":false,"raw_author_name":"Bruno Sinopoli","raw_affiliation_strings":["Washington University in St. Louis, St. Louis,Department of Electrical and Systems Engineering,Brussels,Belgium","Department of Electrical and Systems Engineering, Washington University in St. Louis, St. Louis, Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis, St. Louis,Department of Electrical and Systems Engineering,Brussels,Belgium","institution_ids":["https://openalex.org/I204465549","https://openalex.org/I4210121589"]},{"raw_affiliation_string":"Department of Electrical and Systems Engineering, Washington University in St. Louis, St. Louis, Brussels, Belgium","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019019985","display_name":"Emanuele Garone","orcid":"https://orcid.org/0000-0003-0419-8483"},"institutions":[{"id":"https://openalex.org/I132053463","display_name":"Universit\u00e9 Libre de Bruxelles","ror":"https://ror.org/01r9htc13","country_code":"BE","type":"education","lineage":["https://openalex.org/I132053463"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Emanuele Garone","raw_affiliation_strings":["Universit&#x00E8; Libre de Bruxelles (ULB),Service d&#x2019;Automatique et d&#x2019;Analyse des Syst&#x00E8;mes (SAAS),Brussels,Belgium","Service d'Automatique et d'Analyse des Syst\u00e8mes (SAAS), Universit\u00e8 Libre de Bruxelles (ULB), Brussels, Belgium"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E8; Libre de Bruxelles (ULB),Service d&#x2019;Automatique et d&#x2019;Analyse des Syst&#x00E8;mes (SAAS),Brussels,Belgium","institution_ids":["https://openalex.org/I132053463"]},{"raw_affiliation_string":"Service d'Automatique et d'Analyse des Syst\u00e8mes (SAAS), Universit\u00e8 Libre de Bruxelles (ULB), Brussels, Belgium","institution_ids":["https://openalex.org/I132053463"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058091799"],"corresponding_institution_ids":["https://openalex.org/I132053463"],"apc_list":null,"apc_paid":null,"fwci":5.727,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.96612594,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"712","last_page":"717"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.8348224759101868},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7672553658485413},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6860845685005188},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6266450881958008},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6201769113540649},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.5704495906829834},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44924941658973694},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.4414510130882263},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3871774673461914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35678231716156006},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11432719230651855},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07279998064041138}],"concepts":[{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.8348224759101868},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7672553658485413},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6860845685005188},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6266450881958008},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6201769113540649},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.5704495906829834},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44924941658973694},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.4414510130882263},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3871774673461914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35678231716156006},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11432719230651855},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07279998064041138},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/allerton.2019.8919762","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2019.8919762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},{"id":"pmh:oai:dipot.ulb.ac.be:2013/335055","is_oa":false,"landing_page_url":"http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/335055","pdf_url":null,"source":{"id":"https://openalex.org/S4306401063","display_name":"D\u00e9p\u00f4t institutionnel de l'Universit\u00e9 libre de Bruxelles (Universit\u00e9 Libre de Bruxelles)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I132053463","host_organization_name":"Universit\u00e9 Libre de Bruxelles","host_organization_lineage":["https://openalex.org/I132053463"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"In: 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"info:ulb-repo/semantics/openurl/proceeding"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1493432090","https://openalex.org/W1571323288","https://openalex.org/W2036033662","https://openalex.org/W2062132646","https://openalex.org/W2069364408","https://openalex.org/W2105773843","https://openalex.org/W2107043025","https://openalex.org/W2126904423","https://openalex.org/W2135123910","https://openalex.org/W2158469273","https://openalex.org/W2169239645","https://openalex.org/W2322427245","https://openalex.org/W2498135592","https://openalex.org/W2555431798","https://openalex.org/W2728389370","https://openalex.org/W2734555013","https://openalex.org/W2743309273","https://openalex.org/W2765933375","https://openalex.org/W2811475107","https://openalex.org/W2887654719","https://openalex.org/W2888316225","https://openalex.org/W2906826574","https://openalex.org/W2907018391","https://openalex.org/W2914903322","https://openalex.org/W2932199789","https://openalex.org/W6723946249"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W3019776739","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2968885840","https://openalex.org/W3135700974","https://openalex.org/W4313307484","https://openalex.org/W2791379413","https://openalex.org/W2979539706","https://openalex.org/W2003529583"],"abstract_inverted_index":{"This":[0],"paper":[1],"analyzes":[2],"the":[3,30,34,60,66,79,83,91,97,105,108,111,114,121,126,133],"effect":[4],"of":[5,45,107,113,132],"replay":[6,84],"attacks":[7],"on":[8,138],"constrained":[9],"cyber-physical":[10],"systems":[11],"which":[12,59],"are":[13],"subject":[14],"to":[15,21,77,82,96,119],"linear":[16],"probabilistic":[17],"constraints.":[18],"In":[19],"order":[20,76],"inject":[22],"an":[23],"exogenous":[24],"control":[25,67,98],"input":[26],"without":[27,69],"being":[28,70],"detected":[29,71],"attacker":[31,61],"will":[32],"hijack":[33],"sensors,":[35],"observe":[36],"and":[37,47],"record":[38],"their":[39],"readings":[40],"for":[41],"a":[42,86,139],"certain":[43],"amount":[44],"time":[46],"repeat":[48],"them":[49],"afterwards":[50],"while":[51,124],"carrying":[52],"out":[53],"his":[54],"attack.":[55],"The":[56,130],"conditions":[57],"under":[58],"can":[62,103],"induce":[63],"perturbation":[64],"in":[65,75],"loop":[68],"is":[72,94,117,136],"studied.":[73],"Then,":[74],"make":[78],"system":[80],"resilient":[81],"attack,":[85],"random":[87],"signal":[88,102],"(serving":[89],"as":[90],"authentication":[92,115],"signal)":[93],"added":[95],"input.":[99],"Since":[100],"this":[101],"hamper":[104],"performance":[106],"system,":[109],"finally,":[110],"optimization":[112],"signals":[116],"proposed":[118,134],"maximize":[120],"detection":[122],"rate":[123],"keeping":[125],"process":[127],"deterioration":[128],"bounded.":[129],"effectiveness":[131],"scheme":[135],"demonstrated":[137],"simulated":[140],"case":[141],"study.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":7}],"updated_date":"2026-04-02T13:48:15.688549","created_date":"2025-10-10T00:00:00"}
