{"id":"https://openalex.org/W3043507675","doi":"https://doi.org/10.1109/codit49905.2020.9263905","title":"A System-Theoretic Measure for Quantification of Vulnerabilities to Cyber Attacks with Application to Unmanned Aerial Vehicles","display_name":"A System-Theoretic Measure for Quantification of Vulnerabilities to Cyber Attacks with Application to Unmanned Aerial Vehicles","publication_year":2020,"publication_date":"2020-06-29","ids":{"openalex":"https://openalex.org/W3043507675","doi":"https://doi.org/10.1109/codit49905.2020.9263905","mag":"3043507675"},"language":"en","primary_location":{"id":"doi:10.1109/codit49905.2020.9263905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit49905.2020.9263905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018712800","display_name":"Maryamsadat Tahavori","orcid":"https://orcid.org/0000-0002-2407-6101"},"institutions":[{"id":"https://openalex.org/I184886455","display_name":"Maersk (Denmark)","ror":"https://ror.org/046gbzb64","country_code":"DK","type":"company","lineage":["https://openalex.org/I184886455"]},{"id":"https://openalex.org/I177969490","display_name":"University of Southern Denmark","ror":"https://ror.org/03yrrjy16","country_code":"DK","type":"education","lineage":["https://openalex.org/I177969490"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Maryamsadat Tahavori","raw_affiliation_strings":["Maryamsadat Tahavori is with SDU Drone Center, M\u00e6rsk McKinney M\u00f8ller Institute, University of Southern Denmark, Odense, Denmark"],"affiliations":[{"raw_affiliation_string":"Maryamsadat Tahavori is with SDU Drone Center, M\u00e6rsk McKinney M\u00f8ller Institute, University of Southern Denmark, Odense, Denmark","institution_ids":["https://openalex.org/I184886455","https://openalex.org/I177969490"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5018712800"],"corresponding_institution_ids":["https://openalex.org/I177969490","https://openalex.org/I184886455"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07876002,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"100","issue":null,"first_page":"492","last_page":"495"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9678000211715698,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9674999713897705,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.7749772667884827},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6500594615936279},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4759880304336548},{"id":"https://openalex.org/keywords/remotely-operated-underwater-vehicle","display_name":"Remotely operated underwater vehicle","score":0.4263971745967865},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.41339412331581116},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39702507853507996},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34513503313064575},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19523438811302185},{"id":"https://openalex.org/keywords/mobile-robot","display_name":"Mobile robot","score":0.16365978121757507},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14540937542915344},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.12194055318832397}],"concepts":[{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.7749772667884827},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6500594615936279},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4759880304336548},{"id":"https://openalex.org/C145424490","wikidata":"https://www.wikidata.org/wiki/Q618465","display_name":"Remotely operated underwater vehicle","level":4,"score":0.4263971745967865},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.41339412331581116},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39702507853507996},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34513503313064575},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19523438811302185},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.16365978121757507},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14540937542915344},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.12194055318832397},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/codit49905.2020.9263905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/codit49905.2020.9263905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 7th International Conference on Control, Decision and Information Technologies (CoDIT)","raw_type":"proceedings-article"},{"id":"pmh:oai:sdu.dk:openaire_cris_publications/f0af5431-d01f-45c7-90dd-c4933d8a5339","is_oa":false,"landing_page_url":"https://portal.findresearcher.sdu.dk/da/publications/f0af5431-d01f-45c7-90dd-c4933d8a5339","pdf_url":null,"source":{"id":"https://openalex.org/S4306400423","display_name":"University of Southern Denmark Research Portal (University of Southern Denmark)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177969490","host_organization_name":"University of Southern Denmark","host_organization_lineage":["https://openalex.org/I177969490"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Tahavori, M 2020, A System-Theoretic Measure for Quantification of Vulnerabilities to Cyber Attacks with Application to Unmanned Aerial Vehicles. in 7th International Conference on Control, Decision and Information Technologies (CoDIT). IEEE, Proceedings - International Conference on Control, Decision and Information Technologies, pp. 492-495, 7th, 2020 International IEEE Conference on Control, Decision and Information Technologies, Prag, Czech Republic, 29/06/2020. https://doi.org/10.1109/CoDIT49905.2020.9263905","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W130848762","https://openalex.org/W1525302579","https://openalex.org/W1557652964","https://openalex.org/W1967581691","https://openalex.org/W1968492854","https://openalex.org/W1988376519","https://openalex.org/W2041587044","https://openalex.org/W2050759541","https://openalex.org/W2063260786","https://openalex.org/W2089329623","https://openalex.org/W2101079350","https://openalex.org/W2116998925","https://openalex.org/W2154466790","https://openalex.org/W2175161357","https://openalex.org/W2311756909","https://openalex.org/W2477379160","https://openalex.org/W2545587380","https://openalex.org/W2548657977","https://openalex.org/W2601260651","https://openalex.org/W2605335452","https://openalex.org/W2761119957","https://openalex.org/W2765404027","https://openalex.org/W2783073075","https://openalex.org/W2800348009","https://openalex.org/W2884273733","https://openalex.org/W2963459078","https://openalex.org/W2971859948","https://openalex.org/W6605345177","https://openalex.org/W6685145707"],"related_works":["https://openalex.org/W4229448053","https://openalex.org/W4247925126","https://openalex.org/W4327774218","https://openalex.org/W2059768187","https://openalex.org/W4312858960","https://openalex.org/W4386036939","https://openalex.org/W4379143281","https://openalex.org/W2605096541","https://openalex.org/W3200286695","https://openalex.org/W4212885606"],"abstract_inverted_index":{"The":[0,18,115,136],"popularity":[1],"of":[2,21,38,57,75,77,122,163],"unmanned":[3],"aerial":[4],"vehicles":[5],"(UAV)":[6],"is":[7,47,69,85,105,118,140,156],"on":[8,25],"the":[9,22,34,55,73,103,111,119,160],"rise":[10],"as":[11],"they":[12],"find":[13],"applications":[14],"in":[15,152],"different":[16,147],"areas.":[17],"wide":[19],"adoption":[20],"solutions":[23],"based":[24],"UAV's":[26,39,164],"continually":[27],"raise":[28],"issues":[29],"and":[30,36,40,102,131,142],"concerns":[31],"related":[32],"to":[33,43,50,53,80,87,95,107,158,165],"safety":[35],"security":[37],"their":[41],"vulnerabilities":[42,162],"cyber":[44,81,166],"attacks.":[45,82,167],"It":[46],"therefore":[48],"important":[49],"be":[51,92,108,144],"able":[52],"quantify":[54,159],"level":[56,74,161],"vulnerability":[58,76,138],"for":[59,133,146],"UAV's.":[60],"In":[61],"this":[62,153],"paper,":[63],"a":[64,96],"new":[65],"system":[66,84],"theoretic":[67],"measure":[68,117,139],"proposed":[70,137],"which":[71,126],"quantifies":[72],"dynamic":[78,149],"systems":[79],"A":[83],"vulnerable":[86],"cyberattack,":[88],"if":[89],"it":[90,155],"can":[91,143],"steered":[93],"easily":[94],"particular":[97],"state":[98,104],"by":[99,110],"an":[100],"attacker":[101],"difficult":[106],"observed":[109],"existing":[112],"sensing":[113],"configuration.":[114],"developed":[116],"generalized":[120],"version":[121],"its":[123],"linear":[124,134],"counterpart,":[125],"has":[127],"been":[128],"previously":[129],"defined":[130],"presented":[132],"systems.":[135],"generic":[141],"used":[145,157],"nonlinear":[148],"systems,":[150],"however,":[151],"paper":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
