{"id":"https://openalex.org/W2153741104","doi":"https://doi.org/10.1109/cdc.2010.5717166","title":"The wireless control network: Monitoring for malicious behavior","display_name":"The wireless control network: Monitoring for malicious behavior","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2153741104","doi":"https://doi.org/10.1109/cdc.2010.5717166","mag":"2153741104"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2010.5717166","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2010.5717166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"49th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://repository.upenn.edu/bitstreams/fc0a052a-e151-4aa5-b02c-d682d4f2faea/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076731201","display_name":"Shreyas Sundaram","orcid":"https://orcid.org/0000-0002-5390-2505"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Shreyas Sundaram","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ONT, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ONT, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086742584","display_name":"Miroslav Paji\u0107","orcid":"https://orcid.org/0000-0002-5357-0117"},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Miroslav Pajic","raw_affiliation_strings":["Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I79576946"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030551100","display_name":"Christoforos N. Hadjicostis","orcid":"https://orcid.org/0000-0002-1706-708X"},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"Christoforos N. Hadjicostis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Cyprus, Cyprus"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Cyprus, Cyprus","institution_ids":["https://openalex.org/I34771391"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009445756","display_name":"Rahul Mangharam","orcid":"https://orcid.org/0000-0002-3388-8283"},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rahul Mangharam","raw_affiliation_strings":["Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I79576946"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029243115","display_name":"George J. Pappas","orcid":"https://orcid.org/0000-0001-9081-0637"},"institutions":[{"id":"https://openalex.org/I79576946","display_name":"University of Pennsylvania","ror":"https://ror.org/00b30xv10","country_code":"US","type":"education","lineage":["https://openalex.org/I79576946"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George J. Pappas","raw_affiliation_strings":["Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA","institution_ids":["https://openalex.org/I79576946"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5076731201"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":11.6607,"has_fulltext":true,"cited_by_count":68,"citation_normalized_percentile":{"value":0.98366267,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"5979","last_page":"5984"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10046","display_name":"Stability and Control of Uncertain Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7714706659317017},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7378082275390625},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7267028093338013},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.6421719789505005},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5643967390060425},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5231010913848877},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4896600842475891},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.48046058416366577},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4598451852798462},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.42899060249328613},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39795851707458496},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20513209700584412},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.091746985912323},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07836276292800903}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7714706659317017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7378082275390625},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7267028093338013},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.6421719789505005},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5643967390060425},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5231010913848877},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4896600842475891},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.48046058416366577},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4598451852798462},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.42899060249328613},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39795851707458496},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20513209700584412},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.091746985912323},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07836276292800903},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1109/cdc.2010.5717166","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2010.5717166","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"49th IEEE Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.upenn.edu:mlab_papers-1019","is_oa":true,"landing_page_url":"https://repository.upenn.edu/mlab_papers/20","pdf_url":"https://repository.upenn.edu/bitstreams/fc0a052a-e151-4aa5-b02c-d682d4f2faea/download","source":{"id":"https://openalex.org/S4377196331","display_name":"Scholarly Commons (University of Pennsylvania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79576946","host_organization_name":"University of Pennsylvania","host_organization_lineage":["https://openalex.org/I79576946"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Real-Time and Embedded Systems Lab (mLAB)","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.409.3633","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.409.3633","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.georgejpappas.org//papers/Security-CDC2010.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.422.8223","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.422.8223","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.604.5672","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.604.5672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.seas.upenn.edu/~pajic/TEMP/byz_det_netcon.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.645.7738","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.645.7738","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://repository.upenn.edu/cgi/viewcontent.cgi?article%3D1019%26context%3Dmlab_papers","raw_type":"text"},{"id":"pmh:oai:repository.upenn.edu:20.500.14332/40630","is_oa":false,"landing_page_url":"https://repository.upenn.edu/handle/20.500.14332/40630","pdf_url":null,"source":{"id":"https://openalex.org/S4377196331","display_name":"Scholarly Commons (University of Pennsylvania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79576946","host_organization_name":"University of Pennsylvania","host_organization_lineage":["https://openalex.org/I79576946"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"published","raw_type":"Presentation"}],"best_oa_location":{"id":"pmh:oai:repository.upenn.edu:mlab_papers-1019","is_oa":true,"landing_page_url":"https://repository.upenn.edu/mlab_papers/20","pdf_url":"https://repository.upenn.edu/bitstreams/fc0a052a-e151-4aa5-b02c-d682d4f2faea/download","source":{"id":"https://openalex.org/S4377196331","display_name":"Scholarly Commons (University of Pennsylvania)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79576946","host_organization_name":"University of Pennsylvania","host_organization_lineage":["https://openalex.org/I79576946"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Real-Time and Embedded Systems Lab (mLAB)","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2153741104.pdf","grobid_xml":"https://content.openalex.org/works/W2153741104.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W207267598","https://openalex.org/W1479863711","https://openalex.org/W1482540049","https://openalex.org/W1527626489","https://openalex.org/W1571323288","https://openalex.org/W1971604476","https://openalex.org/W2022406843","https://openalex.org/W2052334067","https://openalex.org/W2082839525","https://openalex.org/W2087932696","https://openalex.org/W2094285453","https://openalex.org/W2099714119","https://openalex.org/W2106831077","https://openalex.org/W2108430497","https://openalex.org/W2111912359","https://openalex.org/W2131877481","https://openalex.org/W2138914918","https://openalex.org/W2139416652","https://openalex.org/W2145404151","https://openalex.org/W2147540630","https://openalex.org/W2153775930","https://openalex.org/W2619874920","https://openalex.org/W2909279315","https://openalex.org/W3141776272","https://openalex.org/W3148190347","https://openalex.org/W3151800125","https://openalex.org/W4256497308","https://openalex.org/W6738520201"],"related_works":["https://openalex.org/W2357468538","https://openalex.org/W1577110157","https://openalex.org/W2355007334","https://openalex.org/W2390009783","https://openalex.org/W4254602698","https://openalex.org/W2394461323","https://openalex.org/W2349441905","https://openalex.org/W2361044160","https://openalex.org/W1483130311","https://openalex.org/W3120792425"],"abstract_inverted_index":{"We":[0,90],"consider":[1],"the":[2,35,56,68,84,88,94,97,102,111,114,128,140,146,151,154,161,166],"problem":[3],"of":[4,11,34,58,83,96,110,127,130,153],"stabilizing":[5],"a":[6,9,17,22,108,125,136],"plant":[7,69],"with":[8],"network":[10,98,115],"resource":[12],"constrained":[13],"wireless":[14,85],"nodes.":[15],"In":[16,40],"companion":[18],"paper,":[19,42],"we":[20,43],"developed":[21],"protocol":[23],"where":[24],"each":[25],"node":[26],"repeatedly":[27],"transmits":[28],"an":[29,45,157],"appropriate":[30],"(stabilizing)":[31],"linear":[32],"combination":[33],"values":[36],"in":[37,87,113,116],"its":[38],"neighborhood.":[39],"this":[41,51,120],"design":[44],"Intrusion":[46],"Detection":[47],"System":[48],"(IDS)":[49],"for":[50,139],"control":[52],"scheme,":[53],"which":[54],"observes":[55],"transmissions":[57],"certain":[59],"nodes":[60,86,112,131,148],"and":[61,73,76,149,156],"uses":[62],"that":[63,92,132],"information":[64],"to":[65,106,118,142,144,164],"(a)":[66],"recover":[67,150],"outputs":[70,152],"(for":[71],"data-logging":[72],"diagnostic":[74],"purposes)":[75],"(b)":[77],"identify":[78,145],"malicious":[79,147],"behavior":[80],"by":[81],"any":[82],"network.":[89],"show":[91],"if":[93],"connectivity":[95],"is":[99],"sufficiently":[100],"high,":[101],"IDS":[103,141],"only":[104],"needs":[105],"observe":[107],"subset":[109],"order":[117],"achieve":[119],"objective.":[121],"Our":[122],"approach":[123],"provides":[124],"characterization":[126],"set":[129],"should":[133],"be":[134],"observed,":[135],"systematic":[137],"procedure":[138],"use":[143],"plant,":[155],"upper":[158],"bound":[159],"on":[160],"delay":[162],"required":[163],"obtain":[165],"necessary":[167],"information.":[168]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":13},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
