{"id":"https://openalex.org/W4407949981","doi":"https://doi.org/10.1109/cdc56724.2024.10886581","title":"Event-Triggered Resilient Control Design in Cyber-Physical Systems Subject to Covert Attacks","display_name":"Event-Triggered Resilient Control Design in Cyber-Physical Systems Subject to Covert Attacks","publication_year":2024,"publication_date":"2024-12-16","ids":{"openalex":"https://openalex.org/W4407949981","doi":"https://doi.org/10.1109/cdc56724.2024.10886581"},"language":"en","primary_location":{"id":"doi:10.1109/cdc56724.2024.10886581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc56724.2024.10886581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 63rd Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101927401","display_name":"Ali Eslami","orcid":"https://orcid.org/0000-0002-0875-9156"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Ali Eslami","raw_affiliation_strings":["Concordia University, Montreal,Department of Electrical and Computer Engineering,Quebec,Canada,H3G 1M8"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal,Department of Electrical and Computer Engineering,Quebec,Canada,H3G 1M8","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009555575","display_name":"K. Khorasani","orcid":"https://orcid.org/0000-0002-6919-3889"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Khashayar Khorasani","raw_affiliation_strings":["Concordia University, Montreal,Department of Electrical and Computer Engineering,Quebec,Canada,H3G 1M8"],"affiliations":[{"raw_affiliation_string":"Concordia University, Montreal,Department of Electrical and Computer Engineering,Quebec,Canada,H3G 1M8","institution_ids":["https://openalex.org/I60158472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101927401"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35286188,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3075","last_page":"3082"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9585000276565552,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7094879150390625},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6481921672821045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6129601001739502},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6023094654083252},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.5912702083587646},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.5154298543930054},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.41700485348701477},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11694183945655823},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08238554000854492}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7094879150390625},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6481921672821045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6129601001739502},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6023094654083252},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.5912702083587646},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.5154298543930054},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.41700485348701477},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11694183945655823},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08238554000854492},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cdc56724.2024.10886581","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc56724.2024.10886581","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 63rd Conference on Decision and Control (CDC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1996505464","https://openalex.org/W2134860205","https://openalex.org/W2913636944","https://openalex.org/W2941251700","https://openalex.org/W2943852008","https://openalex.org/W2988032362","https://openalex.org/W3087277412","https://openalex.org/W3150056606","https://openalex.org/W3155063673","https://openalex.org/W3157430959","https://openalex.org/W3214008961","https://openalex.org/W4210812761","https://openalex.org/W4210830356","https://openalex.org/W4220843165","https://openalex.org/W4288057946","https://openalex.org/W4313855727","https://openalex.org/W4318038619","https://openalex.org/W4385452087"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2523525694","https://openalex.org/W2998642566","https://openalex.org/W2392682561","https://openalex.org/W57793151","https://openalex.org/W2804882289","https://openalex.org/W2727423897","https://openalex.org/W2497612952","https://openalex.org/W4247948804","https://openalex.org/W2392053643"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,14,33,37,40,48,55,67,80,98],"resilient":[4,73],"control":[5],"design":[6,71],"problem":[7],"of":[8,57,79,102],"event-triggered":[9,28],"Cyber-Physical":[10],"Systems":[11],"(CPS)":[12],"when":[13],"system":[15],"is":[16],"subject":[17],"to":[18,65,96],"covert":[19,107],"attacks.":[20,108],"To":[21],"avoid":[22],"continuous":[23],"communication":[24,34],"and":[25,39,42,50,70,92,100],"save":[26],"resources,":[27],"schemes":[29],"are":[30,86],"considered":[31],"on":[32,46],"channels":[35],"between":[36],"plant":[38],"Command":[41],"Control":[43],"(C&C)":[44],"center,":[45],"both":[47],"input":[49],"output":[51],"channels.":[52],"By":[53],"utilizing":[54],"notion":[56],"auxiliary":[58],"systems,":[59],"we":[60],"have":[61],"provided":[62,87],"an":[63],"approach":[64,104],"estimate":[66],"cyber-attack":[68],"signals":[69],"a":[72,89],"controller":[74],"which":[75],"can":[76],"achieve":[77],"stability":[78],"CPS":[81],"system.":[82],"Finally,":[83],"illustrative":[84],"examples":[85],"featuring":[88],"Vertical":[90],"Take-Off":[91],"Landing":[93],"(VTOL)":[94],"aircraft":[95],"demonstrate":[97],"effectiveness":[99],"capabilities":[101],"our":[103],"in":[105],"mitigating":[106]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
