{"id":"https://openalex.org/W3000511303","doi":"https://doi.org/10.1109/tsmc.2019.2960541","title":"Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection","display_name":"Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W3000511303","doi":"https://doi.org/10.1109/tsmc.2019.2960541","mag":"3000511303"},"language":"en","primary_location":{"id":"doi:10.1109/tsmc.2019.2960541","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2019.2960541","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://bura.brunel.ac.uk/bitstream/2438/23453/4/FullText.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100603773","display_name":"Derui Ding","orcid":"https://orcid.org/0000-0001-7402-6682"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Derui Ding","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083874423","display_name":"Qing\u2010Long Han","orcid":"https://orcid.org/0000-0002-7207-0716"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Qing-Long Han","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100699858","display_name":"Zidong Wang","orcid":"https://orcid.org/0000-0002-9576-7401"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]},{"id":"https://openalex.org/I59433898","display_name":"Brunel University of London","ror":"https://ror.org/00dn4t376","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I59433898"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Zidong Wang","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","Department of Computer Science, Brunel University London, Uxbridge, U.K"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]},{"raw_affiliation_string":"Department of Computer Science, Brunel University London, Uxbridge, U.K","institution_ids":["https://openalex.org/I59433898"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102758870","display_name":"Xiaohua Ge","orcid":"https://orcid.org/0000-0003-0180-0897"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiaohua Ge","raw_affiliation_strings":["School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100603773"],"corresponding_institution_ids":["https://openalex.org/I57093077"],"apc_list":null,"apc_paid":null,"fwci":9.9663,"has_fulltext":true,"cited_by_count":105,"citation_normalized_percentile":{"value":0.98687964,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"51","issue":"10","first_page":"6466","last_page":"6476"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7660059332847595},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7087172269821167},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5826197266578674},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5775360465049744},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.540876030921936},{"id":"https://openalex.org/keywords/covariance","display_name":"Covariance","score":0.5279772877693176},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5228859782218933},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.48435959219932556},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.46734434366226196},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.42740023136138916},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4106159508228302},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.40941816568374634},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33671456575393677},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3266621232032776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20977163314819336},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12266311049461365}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7660059332847595},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7087172269821167},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5826197266578674},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5775360465049744},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.540876030921936},{"id":"https://openalex.org/C178650346","wikidata":"https://www.wikidata.org/wiki/Q201984","display_name":"Covariance","level":2,"score":0.5279772877693176},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5228859782218933},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.48435959219932556},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.46734434366226196},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.42740023136138916},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4106159508228302},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.40941816568374634},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33671456575393677},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3266621232032776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20977163314819336},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12266311049461365},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tsmc.2019.2960541","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2019.2960541","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"},{"id":"pmh:oai:bura.brunel.ac.uk:2438/23453","is_oa":true,"landing_page_url":"https://bura.brunel.ac.uk/handle/2438/23453","pdf_url":"http://bura.brunel.ac.uk/bitstream/2438/23453/4/FullText.pdf","source":{"id":"https://openalex.org/S4306401473","display_name":"Brunel University Research Archive (BURA) (Brunel University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I59433898","host_organization_name":"Brunel University of London","host_organization_lineage":["https://openalex.org/I59433898"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:researchbank.swinburne.edu.au:37e9da68-646a-4a7e-9728-a2da02945b97/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/453601","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems (2020), pp. 1-11","raw_type":""}],"best_oa_location":{"id":"pmh:oai:bura.brunel.ac.uk:2438/23453","is_oa":true,"landing_page_url":"https://bura.brunel.ac.uk/handle/2438/23453","pdf_url":"http://bura.brunel.ac.uk/bitstream/2438/23453/4/FullText.pdf","source":{"id":"https://openalex.org/S4306401473","display_name":"Brunel University Research Archive (BURA) (Brunel University London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I59433898","host_organization_name":"Brunel University of London","host_organization_lineage":["https://openalex.org/I59433898"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1368021550","display_name":null,"funder_award_id":"160103567","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G4054611311","display_name":null,"funder_award_id":"DE200101128","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"},{"id":"https://openalex.org/G504232432","display_name":null,"funder_award_id":"DP160103567","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3000511303.pdf","grobid_xml":"https://content.openalex.org/works/W3000511303.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1880424195","https://openalex.org/W1974637237","https://openalex.org/W2019730492","https://openalex.org/W2038651258","https://openalex.org/W2052161176","https://openalex.org/W2076936031","https://openalex.org/W2093197140","https://openalex.org/W2100445566","https://openalex.org/W2104192126","https://openalex.org/W2148142324","https://openalex.org/W2279840521","https://openalex.org/W2313114883","https://openalex.org/W2320627976","https://openalex.org/W2512996947","https://openalex.org/W2546109980","https://openalex.org/W2568479698","https://openalex.org/W2589638514","https://openalex.org/W2594271067","https://openalex.org/W2595982264","https://openalex.org/W2597062023","https://openalex.org/W2615951371","https://openalex.org/W2641422790","https://openalex.org/W2770337865","https://openalex.org/W2770983174","https://openalex.org/W2783384406","https://openalex.org/W2791994205","https://openalex.org/W2808419467","https://openalex.org/W2885249296","https://openalex.org/W2889702961","https://openalex.org/W2901505152","https://openalex.org/W2903204749","https://openalex.org/W2903413770","https://openalex.org/W2904889657","https://openalex.org/W2905630037","https://openalex.org/W2907299225","https://openalex.org/W2910473178","https://openalex.org/W2921874104","https://openalex.org/W2922520136","https://openalex.org/W2925438923","https://openalex.org/W2951782192","https://openalex.org/W2962888183","https://openalex.org/W2968807246","https://openalex.org/W2971723304","https://openalex.org/W2972371309","https://openalex.org/W2984987324","https://openalex.org/W4285719527","https://openalex.org/W6639525610","https://openalex.org/W6734609075","https://openalex.org/W6757214952"],"related_works":["https://openalex.org/W3004173571","https://openalex.org/W3019776739","https://openalex.org/W2546638913","https://openalex.org/W2209816623","https://openalex.org/W2086397253","https://openalex.org/W2968885840","https://openalex.org/W3135700974","https://openalex.org/W4313307484","https://openalex.org/W2791379413","https://openalex.org/W2086962923"],"abstract_inverted_index":{"This":[0],"article":[1],"is":[2,74,94,99,121,170],"concerned":[3],"with":[4],"the":[5,22,27,48,53,71,78,108,124,132,139,145,149,152,158,161,174,177],"distributed":[6,18,92,135],"recursive":[7,105],"filtering":[8,114,179],"of":[9,13,16,24,47,87,104,111,113,118,127,134,160,176],"cyber-physical":[10],"systems":[11],"consisting":[12],"a":[14,66,90,102,164],"set":[15,103],"spatially":[17],"subsystems.":[19],"Due":[20],"to":[21,35,76,122,172],"vulnerability":[23],"communication":[25],"networks,":[26],"transmitted":[28],"data":[29],"among":[30],"subsystems":[31],"could":[32],"be":[33],"subject":[34],"deception":[36],"attacks.":[37,62],"In":[38,85],"this":[39,64],"article,":[40],"attackers":[41],"do":[42],"not":[43],"have":[44],"enough":[45],"knowledge":[46],"full":[49],"network":[50],"topology":[51],"and":[52,56,96,130,148,155],"system":[54,169],"parameters":[55],"therefore":[57],"cannot":[58],"carry":[59],"out":[60],"stealth":[61],"For":[63],"scenario,":[65],"defense":[67],"strategy":[68],"dependent":[69],"on":[70,107,144],"received":[72],"innovation":[73],"proposed":[75,178],"identify":[77],"occurring":[79],"attacks":[80],"as":[81,83],"far":[82],"possible.":[84],"light":[86],"identified":[88],"attacks,":[89],"novel":[91],"filter":[93],"constructed":[95],"its":[97],"gain":[98],"designed":[100],"via":[101],"formulas":[106],"upper":[109,119],"bound":[110,120],"covariance":[112],"errors.":[115],"The":[116],"utilization":[117],"avoid":[123],"calculational":[125],"challenge":[126],"cross-covariance":[128],"matrices":[129],"realize":[131],"requirement":[133,159],"implementation,":[136],"simultaneously.":[137],"Furthermore,":[138],"developed":[140],"scheme":[141],"only":[142],"depends":[143],"neighboring":[146],"information":[147,150],"from":[151],"subsystem":[153],"itself,":[154],"thereby":[156],"satisfying":[157],"scalability.":[162],"Finally,":[163],"standard":[165],"IEEE":[166],"39-bus":[167],"power":[168],"utilized":[171],"verify":[173],"effectiveness":[175],"scheme.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":25},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":27},{"year":2020,"cited_by_count":11}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
