{"id":"https://openalex.org/W2086609129","doi":"https://doi.org/10.1109/cdc.2011.6160641","title":"Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design","display_name":"Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design","publication_year":2011,"publication_date":"2011-12-01","ids":{"openalex":"https://openalex.org/W2086609129","doi":"https://doi.org/10.1109/cdc.2011.6160641","mag":"2086609129"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2011.6160641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2011.6160641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Conference on Decision and Control and European Control Conference","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1103.2795","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049920415","display_name":"Fabio Pasqualetti","orcid":"https://orcid.org/0000-0002-8457-8656"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fabio Pasqualetti","raw_affiliation_strings":["Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara, USA","Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara, USA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, USA#TAB#","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091434894","display_name":"Florian D\u00f6rfler","orcid":"https://orcid.org/0000-0002-9649-5305"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Florian Dorfler","raw_affiliation_strings":["Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara, USA","Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara, USA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, USA#TAB#","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068353454","display_name":"Francesco Bullo","orcid":"https://orcid.org/0000-0002-4785-2118"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Francesco Bullo","raw_affiliation_strings":["Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara, USA","Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Control, Dynamical Systems and Computation, University of California, Santa Barbara, USA","institution_ids":["https://openalex.org/I154570441"]},{"raw_affiliation_string":"Center for Control, Dynamical Systems and Computation, University of California at Santa Barbara, USA#TAB#","institution_ids":["https://openalex.org/I154570441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049920415"],"corresponding_institution_ids":["https://openalex.org/I154570441"],"apc_list":null,"apc_paid":null,"fwci":6.5666,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.96420301,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2195","last_page":"2201"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9868000149726868,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10305","display_name":"Power System Optimization and Stability","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7605252265930176},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7518875598907471},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6836647391319275},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6395830512046814},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5083305239677429},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4774218797683716},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4507737159729004},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.43610650300979614},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.41886287927627563},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.08160662651062012}],"concepts":[{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7605252265930176},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7518875598907471},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6836647391319275},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6395830512046814},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5083305239677429},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4774218797683716},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4507737159729004},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43610650300979614},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.41886287927627563},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.08160662651062012},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1109/cdc.2011.6160641","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2011.6160641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Conference on Decision and Control and European Control Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1103.2795","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1103.2795","pdf_url":"https://arxiv.org/pdf/1103.2795","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2086609129","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/1103.2795","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:zenodo.org:1265792","is_oa":true,"landing_page_url":"https://zenodo.org/record/1265792","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"doi:10.48550/arxiv.1103.2795","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1103.2795","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1103.2795","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1103.2795","pdf_url":"https://arxiv.org/pdf/1103.2795","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W11021045","https://openalex.org/W1505010548","https://openalex.org/W1556970733","https://openalex.org/W1592980365","https://openalex.org/W1598852905","https://openalex.org/W1844872857","https://openalex.org/W1992488456","https://openalex.org/W2001464395","https://openalex.org/W2005028112","https://openalex.org/W2011284636","https://openalex.org/W2026092041","https://openalex.org/W2032506492","https://openalex.org/W2042630760","https://openalex.org/W2044535354","https://openalex.org/W2099606241","https://openalex.org/W2106424475","https://openalex.org/W2112668583","https://openalex.org/W2115656617","https://openalex.org/W2124882062","https://openalex.org/W2126708831","https://openalex.org/W2143708085","https://openalex.org/W2149811200","https://openalex.org/W2153775930","https://openalex.org/W2155125112","https://openalex.org/W2163058271","https://openalex.org/W2482791116","https://openalex.org/W2536830723","https://openalex.org/W2962910558","https://openalex.org/W2963459078","https://openalex.org/W3145665386","https://openalex.org/W4254671851","https://openalex.org/W4254742956","https://openalex.org/W6730385413"],"related_works":["https://openalex.org/W2115656617","https://openalex.org/W2038651258","https://openalex.org/W2051054517","https://openalex.org/W2003530067","https://openalex.org/W1571323288","https://openalex.org/W2783639167","https://openalex.org/W2142987734","https://openalex.org/W3166494079","https://openalex.org/W2883996237","https://openalex.org/W3086412856","https://openalex.org/W3013996776","https://openalex.org/W2904081477","https://openalex.org/W3006443944","https://openalex.org/W2765282448","https://openalex.org/W2571491401","https://openalex.org/W3135689018","https://openalex.org/W2766120863","https://openalex.org/W2739085387","https://openalex.org/W3029014567","https://openalex.org/W2744807764"],"abstract_inverted_index":{"Future":[0],"power":[1,44],"networks":[2],"will":[3],"be":[4],"characterized":[5],"by":[6,37],"safe":[7],"and":[8,13,22,28,68,79,85,93,119],"reliable":[9],"functionality":[10],"against":[11],"physical":[12],"cyber":[14],"attacks.":[15,70],"This":[16],"paper":[17],"proposes":[18],"a":[19,43,50,112,121],"unified":[20],"framework":[21],"advanced":[23],"monitoring":[24],"procedures":[25,81,95],"to":[26],"detect":[27],"identify":[29],"network":[30],"components":[31],"malfunction":[32],"or":[33],"measurements":[34],"corruption":[35],"caused":[36],"an":[38],"omniscient":[39],"adversary.":[40],"We":[41,71],"model":[42,60],"system":[45,54],"under":[46],"cyber-physical":[47],"attack":[48,59,83],"as":[49],"linear":[51],"time-invariant":[52],"descriptor":[53],"with":[55,114],"unknown":[56],"inputs.":[57],"Our":[58],"generalizes":[61],"the":[62,73,106],"prototypical":[63],"stealth,":[64],"(dynamic)":[65,91],"false-data":[66],"injection":[67],"replay":[69],"characterize":[72],"fundamental":[74],"limitations":[75],"of":[76,108],"both":[77],"static":[78],"dynamic":[80],"for":[82],"detection":[84,92,117],"identification.":[86],"Additionally,":[87],"we":[88,104],"design":[89],"provably-correct":[90],"identification":[94],"based":[96],"on":[97],"tools":[98],"from":[99],"geometric":[100],"control":[101],"theory.":[102],"Finally,":[103],"illustrate":[105],"effectiveness":[107],"our":[109],"method":[110],"through":[111,120],"comparison":[113],"existing":[115],"(static)":[116],"algorithms,":[118],"numerical":[122],"study.":[123]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
