{"id":"https://openalex.org/W4414054186","doi":"https://doi.org/10.1109/tsmc.2025.3605339","title":"Switching-Based Moving Target Defense Control Against Cyberattacks","display_name":"Switching-Based Moving Target Defense Control Against Cyberattacks","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414054186","doi":"https://doi.org/10.1109/tsmc.2025.3605339"},"language":"en","primary_location":{"id":"doi:10.1109/tsmc.2025.3605339","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2025.3605339","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026248040","display_name":"Lezhong Xu","orcid":"https://orcid.org/0009-0007-9819-8367"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lezhong Xu","raw_affiliation_strings":["Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102897018","display_name":"Hongming Zhu","orcid":"https://orcid.org/0009-0007-4928-527X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongming Zhu","raw_affiliation_strings":["Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006012039","display_name":"Chengwei Wu","orcid":"https://orcid.org/0000-0001-9600-0205"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengwei Wu","raw_affiliation_strings":["Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072789298","display_name":"Yabin Gao","orcid":"https://orcid.org/0000-0002-4344-4600"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yabin Gao","raw_affiliation_strings":["Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108047839","display_name":"Ligang Wu","orcid":"https://orcid.org/0000-0001-8198-5267"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ligang Wu","raw_affiliation_strings":["Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026248040"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":null,"apc_paid":null,"fwci":1.4888,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.8674858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"55","issue":"11","first_page":"8402","last_page":"8411"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.883899986743927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.883899986743927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.8781999945640564,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12158","display_name":"Guidance and Control Systems","score":0.8264999985694885,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6291000247001648},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5544000267982483},{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.5507000088691711},{"id":"https://openalex.org/keywords/alarm","display_name":"ALARM","score":0.5026000142097473},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4862000048160553},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.48069998621940613},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.4237000048160553}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6291000247001648},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5544000267982483},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.5507000088691711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5228000283241272},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.5026000142097473},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4862000048160553},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.48069998621940613},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.4237000048160553},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40459999442100525},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.38350000977516174},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.37790000438690186},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3709999918937683},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.3488999903202057},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C167964875","wikidata":"https://www.wikidata.org/wiki/Q17011487","display_name":"Exponential stability","level":3,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsmc.2025.3605339","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsmc.2025.3605339","pdf_url":null,"source":{"id":"https://openalex.org/S4210209078","display_name":"IEEE Transactions on Systems Man and Cybernetics Systems","issn_l":"2168-2216","issn":["2168-2216","2168-2232"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2047719998","https://openalex.org/W2062132646","https://openalex.org/W2066689921","https://openalex.org/W2106754783","https://openalex.org/W2343541124","https://openalex.org/W2568479698","https://openalex.org/W2778403987","https://openalex.org/W2913636944","https://openalex.org/W2943852008","https://openalex.org/W2996903041","https://openalex.org/W3015296286","https://openalex.org/W3082815818","https://openalex.org/W3135872604","https://openalex.org/W3176269432","https://openalex.org/W3180235942","https://openalex.org/W3182007606","https://openalex.org/W4206657397","https://openalex.org/W4210658311","https://openalex.org/W4220716320","https://openalex.org/W4281616601","https://openalex.org/W4310244117","https://openalex.org/W4312559803","https://openalex.org/W4321608938","https://openalex.org/W4360995670","https://openalex.org/W4362474446","https://openalex.org/W4379382524","https://openalex.org/W4386982202","https://openalex.org/W4387011270","https://openalex.org/W4387831891","https://openalex.org/W4387886098","https://openalex.org/W4390691528","https://openalex.org/W4390776833","https://openalex.org/W4391582495","https://openalex.org/W4392667157","https://openalex.org/W4396853085","https://openalex.org/W4400525169","https://openalex.org/W4400678981","https://openalex.org/W4407269888","https://openalex.org/W4408977036"],"related_works":["https://openalex.org/W235339106","https://openalex.org/W4389587620","https://openalex.org/W85490455","https://openalex.org/W631884290","https://openalex.org/W2168817143","https://openalex.org/W2012641060","https://openalex.org/W2061299167","https://openalex.org/W1596681707","https://openalex.org/W2564745267","https://openalex.org/W350155893"],"abstract_inverted_index":{"This":[0],"article":[1],"addresses":[2],"the":[3,12,29,97,123,133,137,142,148,151],"issue":[4],"of":[5,14,64,125,150],"security":[6,111,126],"in":[7,11,52],"cyber\u2013physical":[8],"systems":[9],"(CPSs)":[10],"context":[13],"malicious":[15],"actuator":[16,118],"false":[17],"data":[18],"injection":[19],"(FDI)":[20],"attacks.":[21,119],"Building":[22],"on":[23,68,162],"a":[24,36,62,158,163],"stochastic":[25],"physical":[26,165],"dynamics":[27],"model,":[28],"proposed":[30,152],"approach":[31],"distinguishes":[32],"itself":[33],"by":[34],"employing":[35],"moving":[37,76],"target":[38],"defense":[39],"(MTD)":[40],"strategy":[41,154],"to":[42,84,104,115],"enable":[43],"proactive":[44],"protection,":[45],"which":[46,132],"is":[47,59,82,95,102,113,155],"an":[48,87,93,109],"aspect":[49],"rarely":[50],"addressed":[51],"existing":[53],"related":[54],"works.":[55],"The":[56],"system":[57],"model":[58],"formulated":[60],"as":[61,75],"family":[63],"controllable":[65,71,100,106],"submodels":[66,72],"based":[67,161],"controllability.":[69],"These":[70],"are":[73,129],"regarded":[74],"targets.":[77],"A":[78],"residual-based":[79],"attack":[80,88],"detector":[81],"introduced":[83],"justify":[85],"whether":[86],"occurs":[89],"or":[90],"not.":[91],"When":[92],"alarm":[94],"triggered,":[96],"current":[98],"running":[99],"submodel":[101],"switched":[103],"another":[105],"one.":[107],"Furthermore,":[108],"MTD-based":[110],"controller":[112],"devised":[114],"proactively":[116],"mitigate":[117],"Sufficient":[120],"conditions":[121],"for":[122],"design":[124],"control":[127,153],"gains":[128],"formulated,":[130],"using":[131],"CPSs":[134],"can":[135],"preserve":[136],"mean-square":[138],"exponential":[139],"stability":[140],"with":[141],"desired":[143],"disturbance":[144],"rejection":[145],"level.":[146],"Finally,":[147],"effectiveness":[149],"demonstrated":[156],"through":[157],"comparative":[159],"simulation":[160],"practical":[164],"system.":[166]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
