{"id":"https://openalex.org/W2900912287","doi":"https://doi.org/10.1109/iisr.2018.8535978","title":"Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems","display_name":"Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems","publication_year":2018,"publication_date":"2018-08-01","ids":{"openalex":"https://openalex.org/W2900912287","doi":"https://doi.org/10.1109/iisr.2018.8535978","mag":"2900912287"},"language":"en","primary_location":{"id":"doi:10.1109/iisr.2018.8535978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iisr.2018.8535978","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014821132","display_name":"Ryogo Kubo","orcid":"https://orcid.org/0000-0001-8141-9986"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Ryogo Kubo","raw_affiliation_strings":["Department of Electronics and Electrical Engineering, Keio University, Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Electrical Engineering, Keio University, Yokohama, Japan","institution_ids":["https://openalex.org/I203951103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014821132"],"corresponding_institution_ids":["https://openalex.org/I203951103"],"apc_list":null,"apc_paid":null,"fwci":1.3031,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.85608402,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"7","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11687","display_name":"Teleoperation and Haptic Systems","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/2210","display_name":"Mechanical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/teleoperation","display_name":"Teleoperation","score":0.9627252817153931},{"id":"https://openalex.org/keywords/telerobotics","display_name":"Telerobotics","score":0.7065994739532471},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.7029938101768494},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6928611993789673},{"id":"https://openalex.org/keywords/master/slave","display_name":"Master/slave","score":0.5448749661445618},{"id":"https://openalex.org/keywords/observer","display_name":"Observer (physics)","score":0.5392448306083679},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5301592946052551},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5170891284942627},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.5150179862976074},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4418383538722992},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.42047595977783203},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3376506567001343},{"id":"https://openalex.org/keywords/mobile-robot","display_name":"Mobile robot","score":0.29396650195121765},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23483413457870483},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1951615810394287}],"concepts":[{"id":"https://openalex.org/C161759796","wikidata":"https://www.wikidata.org/wiki/Q3982902","display_name":"Teleoperation","level":3,"score":0.9627252817153931},{"id":"https://openalex.org/C196467688","wikidata":"https://www.wikidata.org/wiki/Q1851985","display_name":"Telerobotics","level":4,"score":0.7065994739532471},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.7029938101768494},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6928611993789673},{"id":"https://openalex.org/C20454292","wikidata":"https://www.wikidata.org/wiki/Q735523","display_name":"Master/slave","level":2,"score":0.5448749661445618},{"id":"https://openalex.org/C2780704645","wikidata":"https://www.wikidata.org/wiki/Q9251458","display_name":"Observer (physics)","level":2,"score":0.5392448306083679},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5301592946052551},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5170891284942627},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.5150179862976074},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4418383538722992},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.42047595977783203},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3376506567001343},{"id":"https://openalex.org/C19966478","wikidata":"https://www.wikidata.org/wiki/Q4810574","display_name":"Mobile robot","level":3,"score":0.29396650195121765},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23483413457870483},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1951615810394287},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iisr.2018.8535978","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iisr.2018.8535978","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1989931931","https://openalex.org/W1990577054","https://openalex.org/W2030140501","https://openalex.org/W2033193336","https://openalex.org/W2091770693","https://openalex.org/W2096323098","https://openalex.org/W2102279668","https://openalex.org/W2114151726","https://openalex.org/W2131905000","https://openalex.org/W2135464393","https://openalex.org/W2158469273","https://openalex.org/W2319367234","https://openalex.org/W2413659174","https://openalex.org/W2502231523","https://openalex.org/W2529094992","https://openalex.org/W2758966524","https://openalex.org/W2762155482","https://openalex.org/W2790718760","https://openalex.org/W4242059591"],"related_works":["https://openalex.org/W2046710269","https://openalex.org/W2097059456","https://openalex.org/W817518365","https://openalex.org/W2141648055","https://openalex.org/W2145103607","https://openalex.org/W4367662652","https://openalex.org/W2145960295","https://openalex.org/W157833000","https://openalex.org/W2013463538","https://openalex.org/W2101849315"],"abstract_inverted_index":{"Cybersecurity":[0],"in":[1,8,47],"control":[2,14],"systems":[3,15],"has":[4],"been":[5],"actively":[6],"discussed":[7],"recent":[9],"years.":[10],"In":[11],"particular,":[12],"networked":[13],"(NCSs)":[16],"over":[17],"the":[18,42,64,67,82,100,108,124,131,135,141,144],"Internet":[19,65],"are":[20,89],"exposed":[21],"to":[22],"various":[23],"types":[24],"of":[25,41,99,111,143],"cyberattacks":[26],"such":[27],"as":[28],"false":[29,43],"data":[30,44],"injection":[31,45],"attacks.":[32],"This":[33],"paper":[34],"proposes":[35],"a":[36,92],"detection":[37,94],"and":[38,60,69,84,102,114,127],"mitigation":[39],"method":[40,74,148],"attacks":[46,88],"interactive":[48],"NCSs,":[49],"i.e.,":[50],"bilateral":[51,55],"teleoperation":[52,56],"systems.":[53],"A":[54,117],"system":[57],"exchanges":[58],"position":[59,109,126],"force":[61,128],"information":[62],"through":[63,134],"between":[66],"master":[68,101],"slave":[70,103],"robots.":[71],"The":[72,87,105,146],"proposed":[73,147],"utilizes":[75],"two":[76,136],"redundant":[77],"communication":[78,137],"channels":[79],"for":[80],"both":[81],"master-to-slave":[83],"slave-to-master":[85],"paths.":[86],"detected":[90],"by":[91,151],"tamper":[93],"observer":[95],"(TDO)":[96],"on":[97,120,140],"each":[98,121],"sides.":[104],"TDO":[106],"compares":[107],"responses":[110,129,132],"actual":[112],"robots":[113],"robot":[115],"models.":[116,155],"path":[118],"selector":[119],"side":[122],"chooses":[123],"appropriate":[125],"from":[130],"received":[133],"channels,":[138],"based":[139],"outputs":[142],"TDO.":[145],"is":[149],"validated":[150],"simulations":[152],"with":[153],"attack":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
