{"id":"https://openalex.org/W4390188644","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","title":"Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification","display_name":"Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188644","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069329132","display_name":"Zhihao Dai","orcid":"https://orcid.org/0000-0003-4007-6862"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Zhihao Dai","raw_affiliation_strings":["University of Warwick,Department of Computer Science,Coventry,UK","Department of Computer Science, University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"University of Warwick,Department of Computer Science,Coventry,UK","institution_ids":["https://openalex.org/I39555362"]},{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064596191","display_name":"Ligang He","orcid":"https://orcid.org/0000-0002-5671-0576"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ligang He","raw_affiliation_strings":["University of Warwick,Department of Computer Science,Coventry,UK","Department of Computer Science, University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"University of Warwick,Department of Computer Science,Coventry,UK","institution_ids":["https://openalex.org/I39555362"]},{"raw_affiliation_string":"Department of Computer Science, University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010240403","display_name":"Shuang\u2010Hua Yang","orcid":"https://orcid.org/0000-0003-0717-5009"},"institutions":[{"id":"https://openalex.org/I71052956","display_name":"University of Reading","ror":"https://ror.org/05v62cm79","country_code":"GB","type":"education","lineage":["https://openalex.org/I71052956"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shuang-Hua Yang","raw_affiliation_strings":["University of Reading,Department of Computer Science,Reading,UK","Department of Computer Science, University of Reading, Reading, UK"],"affiliations":[{"raw_affiliation_string":"University of Reading,Department of Computer Science,Reading,UK","institution_ids":["https://openalex.org/I71052956"]},{"raw_affiliation_string":"Department of Computer Science, University of Reading, Reading, UK","institution_ids":["https://openalex.org/I71052956"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016168339","display_name":"Matthew Leeke","orcid":null},"institutions":[{"id":"https://openalex.org/I79619799","display_name":"University of Birmingham","ror":"https://ror.org/03angcq70","country_code":"GB","type":"education","lineage":["https://openalex.org/I79619799"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Matthew Leeke","raw_affiliation_strings":["School of Computer Science, University of Birmingham,Birmingham,UK","School of Computer Science, University of Birmingham, Birmingham, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Birmingham,Birmingham,UK","institution_ids":["https://openalex.org/I79619799"]},{"raw_affiliation_string":"School of Computer Science, University of Birmingham, Birmingham, UK","institution_ids":["https://openalex.org/I79619799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069329132"],"corresponding_institution_ids":["https://openalex.org/I39555362"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17973094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"48","issue":null,"first_page":"0191","last_page":"0199"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/setpoint","display_name":"Setpoint","score":0.9865505695343018},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6617612838745117},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.596208393573761},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5790061950683594},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5599654912948608},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5039259791374207},{"id":"https://openalex.org/keywords/process-control","display_name":"Process control","score":0.4590211808681488},{"id":"https://openalex.org/keywords/gaussian-process","display_name":"Gaussian process","score":0.45062828063964844},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.43645432591438293},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4272366166114807},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.405155211687088},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3699955344200134},{"id":"https://openalex.org/keywords/control-engineering","display_name":"Control engineering","score":0.36043497920036316},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.34077417850494385},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32389551401138306},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2734684646129608},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.2224227786064148}],"concepts":[{"id":"https://openalex.org/C12302492","wikidata":"https://www.wikidata.org/wiki/Q1752097","display_name":"Setpoint","level":2,"score":0.9865505695343018},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6617612838745117},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.596208393573761},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5790061950683594},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5599654912948608},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5039259791374207},{"id":"https://openalex.org/C155386361","wikidata":"https://www.wikidata.org/wiki/Q1649571","display_name":"Process control","level":3,"score":0.4590211808681488},{"id":"https://openalex.org/C61326573","wikidata":"https://www.wikidata.org/wiki/Q1496376","display_name":"Gaussian process","level":3,"score":0.45062828063964844},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.43645432591438293},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4272366166114807},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.405155211687088},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3699955344200134},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.36043497920036316},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.34077417850494385},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32389551401138306},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2734684646129608},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.2224227786064148},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361334","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:183441","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference Item"},{"id":"pmh:oai:centaur.reading.ac.uk:114553","is_oa":false,"landing_page_url":"https://centaur.reading.ac.uk/114553/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402273","display_name":"CentAUR (University of Reading)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71052956","host_organization_name":"University of Reading","host_organization_lineage":["https://openalex.org/I71052956"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"},{"id":"pmh:oai:pure.atira.dk:publications/04874af6-8ca2-40b0-964b-bec4d1ef6366","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/04874af6-8ca2-40b0-964b-bec4d1ef6366","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Dai , Z , He , L , Yang , S & Leeke , M 2023 , Revealing Ongoing Sensor Attacks in Industrial Control System Via Setpoint Modification . in 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) . IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC) , IEEE , 21st IEEE International Conference on Dependable, Autonomic & Secure Computing , Abu Dhabi , United Arab Emirates , 14/11/23 . https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361334","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2004186751","https://openalex.org/W2010001505","https://openalex.org/W2036033662","https://openalex.org/W2143288231","https://openalex.org/W2145416008","https://openalex.org/W2160049009","https://openalex.org/W2296719434","https://openalex.org/W2532554287","https://openalex.org/W2555431798","https://openalex.org/W2612690371","https://openalex.org/W2891273344","https://openalex.org/W2913636944","https://openalex.org/W2914584698","https://openalex.org/W2950361482","https://openalex.org/W2963445270","https://openalex.org/W3024669438","https://openalex.org/W3105640347","https://openalex.org/W3169450514","https://openalex.org/W3199573619","https://openalex.org/W3209929740","https://openalex.org/W4212795178","https://openalex.org/W4283318673","https://openalex.org/W4312433903","https://openalex.org/W4318486034","https://openalex.org/W4318969743","https://openalex.org/W6720330311","https://openalex.org/W6739901393","https://openalex.org/W6754355446"],"related_works":["https://openalex.org/W1495927848","https://openalex.org/W4205962020","https://openalex.org/W2620138946","https://openalex.org/W90946887","https://openalex.org/W191702426","https://openalex.org/W2994131054","https://openalex.org/W3004171367","https://openalex.org/W1892941422","https://openalex.org/W2004331170","https://openalex.org/W3155069932"],"abstract_inverted_index":{"A":[0],"variety":[1],"of":[2,41,57,128,145,207],"Intrusion":[3],"Detection":[4],"Systems":[5,10],"(IDSs)":[6],"for":[7,142],"Industrial":[8],"Control":[9],"have":[11,43],"been":[12],"proposed":[13,153],"to":[14,46,68,95,111],"detect":[15],"attacks":[16,130,147],"and":[17,21,88,100,160,203],"alert":[18],"operators.":[19],"Passive":[20],"active":[22,143],"detection":[23,170,201],"schemes":[24],"are":[25],"characterised":[26],"by":[27,107],"whether":[28],"or":[29,54],"not":[30],"they":[31],"interact":[32],"with":[33,115],"the":[34,51,55,109,125,166,173,191,205],"process":[35,52],"under":[36,176],"control,":[37,117],"though":[38],"both":[39],"categories":[40],"approach":[42,73,110,167],"limitations":[44],"relating":[45],"either":[47],"known":[48],"correlations":[49,85],"in":[50,82,148],"data":[53],"use":[56],"explicit":[58],"system":[59,114],"modelling.":[60],"We":[61,104],"propose":[62],"setpoint":[63,78,208],"modification":[64],"as":[65],"a":[66,112,149,158],"strategy":[67,154],"address":[69],"those":[70],"limitations.":[71],"The":[72,152],"superimposes":[74],"Gaussian":[75],"noises":[76],"on":[77,134],"values,":[79],"which":[80,198],"aids":[81],"revealing":[83],"latent":[84],"between":[86],"setpoints":[87,188],"measurements,":[89],"thereby":[90],"allowing":[91],"machine":[92],"learning-based":[93],"IDSs":[94,141],"learn":[96],"them":[97],"during":[98,102],"training":[99],"verify":[101],"inference.":[103],"show":[105],"that":[106,124,165],"applying":[108],"linear":[113],"PID":[116],"statistical":[118],"tests":[119],"can":[120],"be":[121],"configured":[122],"such":[123],"distortion":[126],"power":[127],"sensor":[129,146,175],"is":[131,155,178],"nullified.":[132],"Building":[133],"this":[135],"foundation,":[136],"we":[137,185],"further":[138],"adapt":[139],"passive":[140],"discovery":[144],"process-agnostic":[150],"fashion.":[151],"evaluated":[156],"using":[157],"nonlinear":[159],"simulated":[161],"industrial":[162],"benchmark,":[163],"affirming":[164],"enhances":[168],"intrusion":[169],"performance":[171,202],"when":[172,190],"specific":[174],"consideration":[177],"targeted":[179],"whilst":[180],"incurring":[181],"marginal":[182],"cost.":[183],"Finally,":[184],"explore":[186],"changing":[187],"concurrently":[189],"attacker":[192],"could":[193],"manipulate":[194],"an":[195],"arbitrary":[196],"sensor,":[197],"also":[199],"boosts":[200],"motivates":[204],"exploration":[206],"selection.":[209]},"counts_by_year":[],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
