{"id":"https://openalex.org/W2514038449","doi":"https://doi.org/10.1109/tifs.2016.2607695","title":"Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems","display_name":"Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems","publication_year":2016,"publication_date":"2016-09-08","ids":{"openalex":"https://openalex.org/W2514038449","doi":"https://doi.org/10.1109/tifs.2016.2607695","mag":"2514038449"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2607695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2607695","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011450975","display_name":"Parth Pradhan","orcid":"https://orcid.org/0000-0003-4130-5073"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Parth Pradhan","raw_affiliation_strings":["Electrical and Computer Engineering Department, Lehigh University, Bethlehem, PA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Lehigh University, Bethlehem, PA, USA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014965408","display_name":"Parv Venkitasubramaniam","orcid":"https://orcid.org/0000-0002-0999-3331"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Parv Venkitasubramaniam","raw_affiliation_strings":["Electrical and Computer Engineering Department, Lehigh University, Bethlehem, PA, USA"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, Lehigh University, Bethlehem, PA, USA","institution_ids":["https://openalex.org/I186143895"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011450975"],"corresponding_institution_ids":["https://openalex.org/I186143895"],"apc_list":null,"apc_paid":null,"fwci":1.6068,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84805483,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"12","issue":"4","first_page":"779","last_page":"792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8220683336257935},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.8045740723609924},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6551477313041687},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.6463623046875},{"id":"https://openalex.org/keywords/smart-grid","display_name":"Smart grid","score":0.5921242833137512},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.510342538356781},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5097751021385193},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.451302170753479},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33085957169532776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8220683336257935},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.8045740723609924},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6551477313041687},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.6463623046875},{"id":"https://openalex.org/C10558101","wikidata":"https://www.wikidata.org/wiki/Q689855","display_name":"Smart grid","level":2,"score":0.5921242833137512},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.510342538356781},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5097751021385193},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.451302170753479},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33085957169532776},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2607695","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2607695","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6600000262260437}],"awards":[{"id":"https://openalex.org/G2336842085","display_name":null,"funder_award_id":"CNS-1117701","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2619393128","display_name":null,"funder_award_id":"CCF-1149495","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3172341145","display_name":null,"funder_award_id":"CCF-1617889","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1536023576","https://openalex.org/W1569777704","https://openalex.org/W1655958391","https://openalex.org/W1933018008","https://openalex.org/W1973742944","https://openalex.org/W1990790875","https://openalex.org/W1992370357","https://openalex.org/W2003530067","https://openalex.org/W2020872955","https://openalex.org/W2026092041","https://openalex.org/W2033939184","https://openalex.org/W2038651258","https://openalex.org/W2039427951","https://openalex.org/W2041623988","https://openalex.org/W2062132646","https://openalex.org/W2072743158","https://openalex.org/W2103647628","https://openalex.org/W2119567691","https://openalex.org/W2124882062","https://openalex.org/W2128735745","https://openalex.org/W2133524420","https://openalex.org/W2136173668","https://openalex.org/W2143708085","https://openalex.org/W2149463733","https://openalex.org/W2149822156","https://openalex.org/W2163599171","https://openalex.org/W2169239645","https://openalex.org/W2169991041","https://openalex.org/W2327696460","https://openalex.org/W2541190192","https://openalex.org/W2556022294","https://openalex.org/W2963459078","https://openalex.org/W3133603318","https://openalex.org/W3145665386"],"related_works":["https://openalex.org/W2123681352","https://openalex.org/W2999599390","https://openalex.org/W4315472290","https://openalex.org/W4295124898","https://openalex.org/W2212585693","https://openalex.org/W2918039754","https://openalex.org/W3112099530","https://openalex.org/W2088745056","https://openalex.org/W2085319386","https://openalex.org/W1658340114"],"abstract_inverted_index":{"Cyber":[0],"physical":[1,5,36,142],"systems":[2,92],"which":[3],"integrate":[4],"system":[6,37],"dynamics":[7],"with":[8,146],"digital":[9],"cyber":[10,44],"infrastructure":[11],"are":[12],"envisioned":[13],"to":[14,39,83,155,168,172,226,237,273],"transform":[15],"our":[16],"core":[17],"infrastructural":[18],"frameworks,":[19],"such":[20,114],"as":[21,187],"the":[22,35,40,54,64,66,94,111,129,141,151,157,165,170,178,182,190,194,200,211,239,254,266,270,282,286,292,296],"smart":[23,67],"electricity":[24,68],"grid,":[25,69],"transportation":[26],"networks,":[27],"and":[28,49,70,110,140,196,210,285],"advanced":[29],"manufacturing.":[30],"This":[31,261],"integration,":[32],"however,":[33],"exposes":[34],"functioning":[38],"security":[41],"vulnerabilities":[42],"of":[43,56,96,113,133,138,159,164,177,184,199,241,256,295],"communication.":[45],"Both":[46],"scientific":[47],"studies":[48],"real-world":[50],"examples":[51],"have":[52],"demonstrated":[53],"impact":[55],"data":[57,85,100,125,139,152,231],"injection":[58,101,126],"attacks":[59,87,102,107,115,127],"on":[60,88,104],"complex":[61],"systems,":[62],"including":[63],"Internet,":[65],"air":[71],"traffic":[72,242],"systems.":[73],"In":[74,119],"this":[75,120],"paper,":[76,121],"an":[77,97,160,248,257],"abstract":[78],"theoretical":[79],"framework":[80,222],"is":[81,131,144,167,223,263,272],"proposed":[82,221],"study":[84,123],"injection/modification":[86],"Markov":[89],"modeled":[90],"dynamical":[91],"from":[93,244,265],"perspective":[95,268],"adversary.":[98,161],"Typical":[99],"focus":[103],"one":[105],"shot":[106],"by":[108,189,247,281,291,304],"adversary":[109,130,166,250,267],"non-detectability":[112],"under":[116],"static":[117],"assumptions.":[118],"we":[122],"dynamic":[124],"where":[128,233],"capable":[132],"modifying":[134],"a":[135,174,227,234,305],"temporal":[136],"sequence":[137],"controller":[143,179],"equipped":[145],"prior":[147,195],"statistical":[148],"knowledge":[149],"about":[150],"arrival":[153],"process":[154],"detect":[156],"presence":[158,186],"The":[162,203,220],"goal":[163,271],"modify":[169,253],"arrivals":[171],"minimize":[173],"utility":[175,209],"function":[176],"while":[180],"minimizing":[181],"detectability":[183,212,278],"his":[185],"measured":[188,280,290],"K-L":[191,283],"divergence":[192,284],"between":[193,205],"posterior":[197],"distribution":[198],"arriving":[201],"data.":[202],"tradeoff":[204],"these":[206],"two":[207,275],"metrics-controller":[208],"cost-is":[213],"studied":[214,264],"analytically":[215],"for":[216],"different":[217],"underlying":[218],"dynamics.":[219],"then":[224],"applied":[225],"practical":[228],"problem":[229,262],"in":[230],"networks":[232],"router":[235],"tries":[236],"hide":[238],"path":[240],"flow":[243],"timing":[245,255],"analysis":[246],"active":[249],"who":[251],"can":[252,301],"incoming":[258],"packet":[259,297],"stream.":[260],"wherein":[269],"balance":[274],"costs-the":[276],"adversary's":[277],"cost":[279,289],"network":[287],"privacy":[288],"maximum":[293],"length":[294],"stream":[298],"whose":[299],"paths":[300],"be":[302],"hidden":[303],"memory":[306],"limited":[307],"router.":[308]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
