{"id":"https://openalex.org/W4312411344","doi":"https://doi.org/10.1109/tcns.2022.3225282","title":"An Optimal DoS Attack Strategy With Pause and Restart Rules Under Energy Constraints","display_name":"An Optimal DoS Attack Strategy With Pause and Restart Rules Under Energy Constraints","publication_year":2022,"publication_date":"2022-11-29","ids":{"openalex":"https://openalex.org/W4312411344","doi":"https://doi.org/10.1109/tcns.2022.3225282"},"language":"en","primary_location":{"id":"doi:10.1109/tcns.2022.3225282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2022.3225282","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100391459","display_name":"Dong Wang","orcid":"https://orcid.org/0000-0002-2493-1032"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Wang","raw_affiliation_strings":["Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, Dalian, China"],"raw_orcid":"https://orcid.org/0000-0002-2493-1032","affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022345954","display_name":"Peilin Jia","orcid":"https://orcid.org/0009-0003-0291-8544"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peilin Jia","raw_affiliation_strings":["Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, Dalian, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042693941","display_name":"Jie Lian","orcid":"https://orcid.org/0000-0003-1033-3805"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Lian","raw_affiliation_strings":["Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, Dalian, China"],"raw_orcid":"https://orcid.org/0000-0003-1033-3805","affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043059608","display_name":"Xinyu Pei","orcid":null},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyu Pei","raw_affiliation_strings":["Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, Dalian, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Ministry of Education, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100391459"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":1.3366,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.79958571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"10","issue":"3","first_page":"1291","last_page":"1302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8021942377090454},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6842809319496155},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6820885539054871},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5296430587768555},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49180009961128235},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.48626649379730225},{"id":"https://openalex.org/keywords/markov-process","display_name":"Markov process","score":0.45135509967803955},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.444879412651062},{"id":"https://openalex.org/keywords/energy","display_name":"Energy (signal processing)","score":0.4314056932926178},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4268079996109009},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.358007550239563}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8021942377090454},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6842809319496155},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6820885539054871},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5296430587768555},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49180009961128235},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.48626649379730225},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.45135509967803955},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.444879412651062},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.4314056932926178},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4268079996109009},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.358007550239563},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcns.2022.3225282","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcns.2022.3225282","pdf_url":null,"source":{"id":"https://openalex.org/S2502544478","display_name":"IEEE Transactions on Control of Network Systems","issn_l":"2325-5870","issn":["2325-5870","2372-2533"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Control of Network Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8199999928474426}],"awards":[{"id":"https://openalex.org/G3239452032","display_name":null,"funder_award_id":"XLYC2007010","funder_id":"https://openalex.org/F4320329895","funder_display_name":"Liaoning Revitalization Talents Program"},{"id":"https://openalex.org/G6062303253","display_name":null,"funder_award_id":"61973050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7846465842","display_name":null,"funder_award_id":"62173061","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329895","display_name":"Liaoning Revitalization Talents Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1651728063","https://openalex.org/W2012005963","https://openalex.org/W2063688797","https://openalex.org/W2068740779","https://openalex.org/W2121039354","https://openalex.org/W2140439200","https://openalex.org/W2158469273","https://openalex.org/W2510308676","https://openalex.org/W2525975698","https://openalex.org/W2530103553","https://openalex.org/W2616310354","https://openalex.org/W2758737610","https://openalex.org/W2770337865","https://openalex.org/W2782359813","https://openalex.org/W2790715269","https://openalex.org/W2900045052","https://openalex.org/W2946017555","https://openalex.org/W2962909029","https://openalex.org/W2964200155","https://openalex.org/W2964977424","https://openalex.org/W2982097845","https://openalex.org/W3002997336","https://openalex.org/W3014928495","https://openalex.org/W3021673895","https://openalex.org/W3024596785","https://openalex.org/W3049666257","https://openalex.org/W3089954048","https://openalex.org/W3108166136","https://openalex.org/W3125869297","https://openalex.org/W3128100466","https://openalex.org/W3138235761","https://openalex.org/W4214733886","https://openalex.org/W4285725498"],"related_works":["https://openalex.org/W2358245908","https://openalex.org/W2143949933","https://openalex.org/W2962870788","https://openalex.org/W1828018529","https://openalex.org/W3130770611","https://openalex.org/W4389319510","https://openalex.org/W3035884183","https://openalex.org/W2914662937","https://openalex.org/W1967425545","https://openalex.org/W2894757949"],"abstract_inverted_index":{"This":[0],"study":[1,134],"investigates":[2],"a":[3,22,70,76],"denial-of-service":[4],"(DoS)":[5],"attack":[6,31,36,53,68,78,111,130,141],"strategy":[7,54,120,131],"against":[8],"cyber-physical":[9],"systems":[10],"(CPS)":[11],"under":[12,21],"energy":[13,24,74],"constraints.":[14],"A":[15,50],"DoS":[16,52],"attacker":[17,39,65],"with":[18,55],"eavesdropping":[19],"ability":[20],"limited":[23],"budget":[25],"was":[26,60,83,121,125],"considered.":[27],"By":[28],"scheduling":[29],"the":[30,38,43,48,64,67,91,101,110,113,118,128,139],"behavior":[32],"based":[33,85],"on":[34,86],"historical":[35],"results,":[37],"aims":[40],"to":[41,72,147],"maximize":[42,109],"state":[44],"estimation":[45],"error":[46],"of":[47,90,100,117],"CPS.":[49],"novel":[51],"pause":[56],"and":[57,97,143],"restart":[58,81,115],"rules":[59],"proposed,":[61],"in":[62,132],"which":[63],"pauses":[66],"for":[69],"while":[71],"restore":[73],"after":[75],"failed":[77],"attempt.":[79],"The":[80,94],"rule":[82,116],"described":[84],"Markov":[87,102],"chain":[88,103],"modeling":[89],"attacking":[92],"period.":[93],"transition":[95],"matrix":[96],"stationary":[98],"distribution":[99],"model":[104],"were":[105,145],"also":[106],"presented.":[107],"To":[108],"effect,":[112],"optimal":[114],"proposed":[119,129],"investigated.":[122],"Finally,":[123],"it":[124],"proven":[126],"that":[127],"this":[133],"is":[135],"more":[136],"destructive":[137],"than":[138],"periodic":[140],"strategy,":[142],"simulations":[144],"provided":[146],"verify":[148],"our":[149],"theoretical":[150],"results.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
