{"id":"https://openalex.org/W2825766531","doi":"https://doi.org/10.1109/meco.2018.8405951","title":"Detecting and counteracting benign faults and malicious attacks in cyber physical systems","display_name":"Detecting and counteracting benign faults and malicious attacks in cyber physical systems","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2825766531","doi":"https://doi.org/10.1109/meco.2018.8405951","mag":"2825766531"},"language":"en","primary_location":{"id":"doi:10.1109/meco.2018.8405951","is_oa":true,"landing_page_url":"https://doi.org/10.1109/meco.2018.8405951","pdf_url":"https://ieeexplore.ieee.org/ielx7/8399137/8405943/08405951.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 7th Mediterranean Conference on Embedded Computing (MECO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/8399137/8405943/08405951.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055210733","display_name":"Israel Koren","orcid":"https://orcid.org/0000-0003-2741-7108"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Israel Koren","raw_affiliation_strings":["University of Massachusetts at Amherst, Amherst, MA 01003, USA"],"affiliations":[{"raw_affiliation_string":"University of Massachusetts at Amherst, Amherst, MA 01003, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5055210733"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5518,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.66672902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9760000109672546,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7169291973114014},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6570015549659729},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6384844779968262},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.41909945011138916},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4181613028049469},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07417145371437073}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7169291973114014},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6570015549659729},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6384844779968262},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.41909945011138916},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4181613028049469},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07417145371437073}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/meco.2018.8405951","is_oa":true,"landing_page_url":"https://doi.org/10.1109/meco.2018.8405951","pdf_url":"https://ieeexplore.ieee.org/ielx7/8399137/8405943/08405951.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 7th Mediterranean Conference on Embedded Computing (MECO)","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1109/meco.2018.8405951","is_oa":true,"landing_page_url":"https://doi.org/10.1109/meco.2018.8405951","pdf_url":"https://ieeexplore.ieee.org/ielx7/8399137/8405943/08405951.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 7th Mediterranean Conference on Embedded Computing (MECO)","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2825766531.pdf","grobid_xml":"https://content.openalex.org/works/W2825766531.grobid-xml"},"referenced_works_count":1,"referenced_works":["https://openalex.org/W6600751047"],"related_works":["https://openalex.org/W3110311961","https://openalex.org/W2803684864","https://openalex.org/W4396897946","https://openalex.org/W3040950835","https://openalex.org/W4386107585","https://openalex.org/W2552246019","https://openalex.org/W2508779374","https://openalex.org/W4285815382","https://openalex.org/W4385452110","https://openalex.org/W4399917864"],"abstract_inverted_index":{"The":[0,113],"use":[1],"of":[2,11,102,118,183,217,228,249,279,312],"cyber-physical":[3],"system":[4,161],"(CPS)":[5],"is":[6,49,142,154,220,270,283,290],"rapidly":[7],"expanding":[8],"and":[9,18,37,61,83,105,120,202,303,318],"many":[10,65],"their":[12],"applications":[13],"require":[14],"a":[15,63,110,159,173,177,214,229,243,309,315,320],"highly":[16],"reliable":[17],"secure":[19],"implementation":[20],"as":[21,51,62,98,100,255,257],"they":[22],"control":[23,140,148,166],"critical":[24,244],"infrastructures":[25],"or":[26,176,232,289],"even":[27,135],"life-critical":[28],"devices.":[29],"Unfortunately,":[30],"current":[31,277],"techniques":[32,201,298],"for":[33,95,299],"achieving":[34],"high":[35,40],"reliability":[36,82],"security":[38,47,52,179],"incur":[39],"overheads.":[41],"In":[42,124,144],"particular,":[43],"integrating":[44],"countermeasures":[45],"against":[46],"attacks":[48],"problematic":[50],"threats":[53],"are":[54],"often":[55,67],"not":[56],"well":[57,99,256],"defined,":[58],"evolve":[59],"continuously,":[60],"result,":[64],"CPSs":[66],"remain":[68],"vulnerable.":[69],"We":[70,292],"propose":[71],"to":[72,79,158,171,242,251,260,271],"exploits":[73],"the":[74,89,125,128,137,151,184,186,205,218,225,276,280,301,324],"physical":[75,281],"plant":[76,91,114,152,187,219,282],"state":[77,92,115,122,153,216,278,302],"information":[78],"enhance":[80],"both":[81],"security.":[84],"Our":[85,235],"approach,":[86],"which":[87],"monitors":[88],"controlled":[90],"trajectory,":[93],"allows":[94],"tunable":[96],"fault-tolerance":[97],"detection":[101],"malicious":[103,178,233,262],"attacks,":[104],"it":[106,222],"achieves":[107],"these":[108],"at":[109],"low":[111],"overhead.":[112],"space":[116],"consists":[117],"safe":[119,126,133,193,211,287],"marginal":[121,215],"subspaces.":[123],"subspace":[127],"CPS":[129],"will":[130,188,223,237],"continue":[131],"its":[132,192,286],"operation":[134],"if":[136],"worst":[138],"case":[139],"signal":[141,224],"applied.":[143],"contrast,":[145],"any":[146],"erroneous":[147,165],"applied":[149],"when":[150],"marginal,":[155],"may":[156,168],"lead":[157],"catastrophic":[160],"failure.":[162],"Such":[163],"an":[164],"output":[167],"be":[169,189,328],"due":[170],"either":[172],"benign":[174],"fault":[175,231],"attack.":[180,234],"As":[181],"most":[182],"time":[185],"deep":[190,284],"within":[191,285],"subspace,":[194],"we":[195],"can":[196,327],"avoid":[197],"using":[198],"expensive":[199],"redundancy":[200,250],"thus,":[203],"reduce":[204],"computational":[206],"load":[207],"while":[208],"still":[209],"guaranteeing":[210],"operation.":[212],"When":[213],"detected,":[221],"potential":[226],"presence":[227],"\u201cnatural\u201d":[230],"scheme":[236],"counter":[238],"this":[239],"by":[240],"switching":[241],"mode":[245],"involving":[246],"higher":[247],"levels":[248],"combat":[252],"natural":[253],"failures":[254],"alternative":[258],"mechanisms":[259],"defeat":[261],"attacks.":[263],"A":[264],"major":[265],"challenge":[266],"in":[267,273,314],"our":[268,304],"approach":[269],"determine,":[272],"real-time,":[274],"whether":[275],"sub-space":[288],"marginal.":[291],"have":[293],"used":[294],"various":[295],"machine":[296],"learning":[297],"classifying":[300],"results":[305],"indicate":[306],"that":[307],"with":[308,319],"reasonable":[310],"number":[311],"entries":[313],"lookup":[316],"table":[317],"short":[321],"execution":[322],"time,":[323],"required":[325],"classification":[326],"performed":[329],"efficiently.":[330]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
