{"id":"https://openalex.org/W4387595392","doi":"https://doi.org/10.1109/etfa54631.2023.10275636","title":"Construction of Model-based Diagnosis of Cyber-Attack in Cyber-Physical Systems Using Labeled Petri Nets","display_name":"Construction of Model-based Diagnosis of Cyber-Attack in Cyber-Physical Systems Using Labeled Petri Nets","publication_year":2023,"publication_date":"2023-09-12","ids":{"openalex":"https://openalex.org/W4387595392","doi":"https://doi.org/10.1109/etfa54631.2023.10275636"},"language":"en","primary_location":{"id":"doi:10.1109/etfa54631.2023.10275636","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/etfa54631.2023.10275636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-04213244/file/Construction_of_Model-based_Diagnosis_of_Cyber-Attack_in_Cyber-Physical_Systems_Using_Labeled_Petri_Nets.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093054739","display_name":"Romain Thibert","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Romain Thibert","raw_affiliation_strings":["ENS Paris-Saclay,LURPA,France"],"affiliations":[{"raw_affiliation_string":"ENS Paris-Saclay,LURPA,France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015177346","display_name":"Gr\u00e9gory Faraut","orcid":"https://orcid.org/0000-0003-0388-932X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gregory Faraut","raw_affiliation_strings":["ENS Paris-Saclay,LURPA,France"],"affiliations":[{"raw_affiliation_string":"ENS Paris-Saclay,LURPA,France","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076250595","display_name":"Sa\u00efd Amari","orcid":"https://orcid.org/0000-0002-9592-3953"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sa\u00efd Amari","raw_affiliation_strings":["ENS Paris-Saclay,LURPA,France"],"affiliations":[{"raw_affiliation_string":"ENS Paris-Saclay,LURPA,France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093054739"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2096189,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"121","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11125","display_name":"Petri Nets in System Modeling","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/petri-net","display_name":"Petri net","score":0.9336808323860168},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.8274251222610474},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.8237772583961487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7177212834358215},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5413126945495605},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5323885679244995},{"id":"https://openalex.org/keywords/stochastic-petri-net","display_name":"Stochastic Petri net","score":0.5321174263954163},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.482669860124588},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4670355021953583},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.41497573256492615},{"id":"https://openalex.org/keywords/complex-system","display_name":"Complex system","score":0.4109354019165039},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3545895516872406},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24271464347839355},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18898683786392212},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13502773642539978},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06942471861839294}],"concepts":[{"id":"https://openalex.org/C38677869","wikidata":"https://www.wikidata.org/wiki/Q724168","display_name":"Petri net","level":2,"score":0.9336808323860168},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.8274251222610474},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.8237772583961487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7177212834358215},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5413126945495605},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5323885679244995},{"id":"https://openalex.org/C197551870","wikidata":"https://www.wikidata.org/wiki/Q7617809","display_name":"Stochastic Petri net","level":3,"score":0.5321174263954163},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.482669860124588},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4670355021953583},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.41497573256492615},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.4109354019165039},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3545895516872406},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24271464347839355},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18898683786392212},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13502773642539978},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06942471861839294},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/etfa54631.2023.10275636","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/etfa54631.2023.10275636","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-04213244v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04213244","pdf_url":"https://hal.science/hal-04213244/file/Construction_of_Model-based_Diagnosis_of_Cyber-Attack_in_Cyber-Physical_Systems_Using_Labeled_Petri_Nets.pdf","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sep 2023, Sina\u00efa, Romania. pp.1-6, &#x27E8;10.1109/ETFA54631.2023.10275636&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-04213244v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04213244","pdf_url":"https://hal.science/hal-04213244/file/Construction_of_Model-based_Diagnosis_of_Cyber-Attack_in_Cyber-Physical_Systems_Using_Labeled_Petri_Nets.pdf","source":{"id":"https://openalex.org/S4406922461","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA), Sep 2023, Sina\u00efa, Romania. pp.1-6, &#x27E8;10.1109/ETFA54631.2023.10275636&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4387595392.pdf","grobid_xml":"https://content.openalex.org/works/W4387595392.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1587663028","https://openalex.org/W2735542325","https://openalex.org/W2782611461","https://openalex.org/W2883996237","https://openalex.org/W2884397601","https://openalex.org/W2889602037","https://openalex.org/W2898913212","https://openalex.org/W2963076019","https://openalex.org/W2971859948","https://openalex.org/W2979959927","https://openalex.org/W2991356567","https://openalex.org/W3017061289","https://openalex.org/W3048888572","https://openalex.org/W3159997794","https://openalex.org/W3160151133","https://openalex.org/W3160693357","https://openalex.org/W3203792064","https://openalex.org/W4206507777","https://openalex.org/W4207062008","https://openalex.org/W4300591351","https://openalex.org/W4309684329","https://openalex.org/W4322576796","https://openalex.org/W6776454215","https://openalex.org/W6795170213"],"related_works":["https://openalex.org/W3125880387","https://openalex.org/W2884574904","https://openalex.org/W2136709541","https://openalex.org/W1980200158","https://openalex.org/W2059607773","https://openalex.org/W2154794415","https://openalex.org/W2389843176","https://openalex.org/W2107824370","https://openalex.org/W1531156418","https://openalex.org/W2159152215"],"abstract_inverted_index":{"Cyber-Physical":[0],"Systems":[1],"(CPS)":[2],"brought":[3],"connectivity":[4,9],"to":[5,19,39,63,77,86,113],"factories,":[6],"and":[7,31,53,102],"with":[8,43],"comes":[10],"a":[11,29,96,104,115],"risk":[12],"of":[13,57,73,91,107,123],"cyber":[14,82],"attack.":[15],"CPSs":[16,42],"are":[17],"vulnerable":[18],"malicious":[20],"attacks":[21,65,124],"in":[22,84,111],"which":[23,118],"an":[24,108,136],"attacker":[25],"is":[26,76,133],"inserted":[27],"between":[28],"process":[30],"its":[32],"control":[33],"unit.":[34],"Some":[35],"papers":[36,61],"have":[37,48,68],"proposed":[38],"model":[40,97,117],"attacked":[41,51,109],"discrete":[44],"event":[45],"systems":[46,52],"(DES),":[47],"successfully":[49],"modeled":[50],"characterised":[54],"different":[55],"types":[56],"attacks.":[58,92],"Nevertheless,":[59],"these":[60],"tend":[62],"treat":[64],"after":[66],"they":[67,126],"become":[69],"problematic.":[70],"The":[71],"objective":[72],"this":[74],"paper":[75],"extend":[78],"previous":[79],"works":[80],"on":[81],"attack":[83],"DES":[85],"build":[87],"models":[88],"for":[89],"diagnosis":[90,116],"We":[93],"will":[94,119],"design":[95],"using":[98],"Labeled":[99],"Petri":[100],"Nets":[101],"construct":[103],"reachability":[105],"graph":[106],"net":[110],"order":[112],"enrich":[114],"allow":[120],"the":[121,129],"detection":[122],"before":[125],"completely":[127],"destabilise":[128],"system.":[130],"This":[131],"construction":[132],"illustrated":[134],"by":[135],"industrial":[137],"example.":[138]},"counts_by_year":[],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
