{"id":"https://openalex.org/W2897446599","doi":"https://doi.org/10.23919/acc.2019.8815318","title":"Simulation and Real-World Evaluation of Attack Detection Schemes","display_name":"Simulation and Real-World Evaluation of Attack Detection Schemes","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2897446599","doi":"https://doi.org/10.23919/acc.2019.8815318","mag":"2897446599"},"language":"en","primary_location":{"id":"doi:10.23919/acc.2019.8815318","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc.2019.8815318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 American Control Conference (ACC)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1810.07773","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004640896","display_name":"Matthew Porter","orcid":"https://orcid.org/0000-0002-1598-3447"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Matthew Porter","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, 48103, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, 48103, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111922808","display_name":"Arnav Joshi","orcid":null},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arnav Joshi","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, 48103, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, 48103, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049322619","display_name":"Pedro Hespanhol","orcid":"https://orcid.org/0000-0002-2946-0153"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pedro Hespanho","raw_affiliation_strings":["University of California Berkeley, Berkeley, CA, 94720, USA"],"affiliations":[{"raw_affiliation_string":"University of California Berkeley, Berkeley, CA, 94720, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014893911","display_name":"Anil Aswani","orcid":"https://orcid.org/0000-0001-5777-7185"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anil Aswani","raw_affiliation_strings":["University of California Berkeley, Berkeley, CA, 94720, USA"],"affiliations":[{"raw_affiliation_string":"University of California Berkeley, Berkeley, CA, 94720, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089990642","display_name":"Matthew Johnson\u2010Roberson","orcid":"https://orcid.org/0000-0002-0506-907X"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Johnson-Roberson","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, 48103, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, 48103, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053632225","display_name":"Ram Vasudevan","orcid":"https://orcid.org/0000-0003-1978-0572"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ram Vasudevan","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, 48103, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, 48103, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004640896"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00388141,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"551","last_page":"558"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.8712874054908752},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7292194962501526},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7067949771881104},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.6901649832725525},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6889065504074097},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.6343269944190979},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5096311569213867},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.47181570529937744},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4592679738998413},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.41472315788269043},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3785412013530731},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33863821625709534},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2670001685619354},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15887311100959778},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09932208061218262},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.08945158123970032},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0891622006893158}],"concepts":[{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.8712874054908752},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7292194962501526},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7067949771881104},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.6901649832725525},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6889065504074097},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.6343269944190979},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5096311569213867},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.47181570529937744},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4592679738998413},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.41472315788269043},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3785412013530731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33863821625709534},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2670001685619354},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15887311100959778},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09932208061218262},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.08945158123970032},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0891622006893158},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.23919/acc.2019.8815318","is_oa":false,"landing_page_url":"https://doi.org/10.23919/acc.2019.8815318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 American Control Conference (ACC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1810.07773","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1810.07773","pdf_url":"https://arxiv.org/pdf/1810.07773","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2897446599","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1810.07773","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1810.07773","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1810.07773","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1810.07773","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1810.07773","pdf_url":"https://arxiv.org/pdf/1810.07773","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1842613633","display_name":null,"funder_award_id":"Ford-UM Alliance","funder_id":"https://openalex.org/F4320307103","funder_display_name":"Ford Motor Company"},{"id":"https://openalex.org/G8182716335","display_name":null,"funder_award_id":"N022977","funder_id":"https://openalex.org/F4320307103","funder_display_name":"Ford Motor Company"}],"funders":[{"id":"https://openalex.org/F4320307103","display_name":"Ford Motor Company","ror":"https://ror.org/00g2tkw06"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2897446599.pdf","grobid_xml":"https://content.openalex.org/works/W2897446599.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1005842850","https://openalex.org/W1559197676","https://openalex.org/W1655377165","https://openalex.org/W1965155137","https://openalex.org/W2039427951","https://openalex.org/W2042960896","https://openalex.org/W2063698478","https://openalex.org/W2278807966","https://openalex.org/W2343541124","https://openalex.org/W2411093439","https://openalex.org/W2528550849","https://openalex.org/W2543248853","https://openalex.org/W2555431798","https://openalex.org/W2603165544","https://openalex.org/W2759023011","https://openalex.org/W2792291478","https://openalex.org/W2886930206","https://openalex.org/W2962717395","https://openalex.org/W2963445270","https://openalex.org/W3130529786","https://openalex.org/W4251032486","https://openalex.org/W4388297583","https://openalex.org/W6695019709"],"related_works":["https://openalex.org/W3135872604","https://openalex.org/W2735265585","https://openalex.org/W2972556562","https://openalex.org/W2042960896","https://openalex.org/W2958749653","https://openalex.org/W2550510940","https://openalex.org/W3155185512","https://openalex.org/W2106267320","https://openalex.org/W3156737304","https://openalex.org/W2914120846","https://openalex.org/W2898811966","https://openalex.org/W2972825588","https://openalex.org/W3157928092","https://openalex.org/W3006161194","https://openalex.org/W2390180548","https://openalex.org/W3135689018","https://openalex.org/W1680757476","https://openalex.org/W3027911620","https://openalex.org/W2907018391","https://openalex.org/W3078085303"],"abstract_inverted_index":{"A":[0],"variety":[1],"of":[2,32,64,79,100,105,140,165],"anomaly":[3,39,115,142],"detection":[4],"schemes":[5],"have":[6,22],"been":[7,23,44],"proposed":[8],"to":[9,13,37,46,52,75,82,88,112,138,158,169],"detect":[10,159],"malicious":[11],"attacks":[12,160],"Cyber-Physical":[14],"Systems.":[15],"Among":[16],"these":[17,145],"schemes,":[18],"Dynamic":[19,49,91,107,133,152],"Watermarking":[20,50,92,108,134,153],"methods":[21,74],"proven":[24],"highly":[25],"effective":[26],"at":[27],"detecting":[28],"a":[29,48,54,69,90,97,121],"wide":[30],"range":[31],"attacks.":[33],"Unfortunately,":[34],"in":[35,117],"contrast":[36],"other":[38,163],"detectors,":[40],"no":[41],"method":[42],"has":[43],"presented":[45],"design":[47,89],"detector":[51,93,109,135,154],"achieve":[53,96],"user-specified":[55,98],"false":[56,101],"alarm":[57],"rate,":[58],"or":[59],"subsequently":[60],"evaluate":[61],"the":[62,77,106,128,132,151,162],"capabilities":[63],"an":[65,80],"attacker":[66],"under":[67,131],"such":[68],"selection.":[70],"This":[71],"paper":[72],"describes":[73],"measure":[76],"capability":[78,130],"attacker,":[81],"numerically":[83],"approximate":[84],"this":[85],"metric,":[86],"and":[87,119],"that":[94,127,150,161],"can":[95],"rate":[99],"alarms.":[102],"The":[103],"performance":[104],"is":[110,136,155],"compared":[111],"three":[113],"classical":[114],"detectors":[116,166],"simulation":[118],"on":[120],"real-world":[122],"platform.":[123],"These":[124],"experiments":[125,146],"illustrate":[126],"attack":[129],"comparable":[137],"those":[139],"classic":[141],"detectors.":[143],"Importantly,":[144],"also":[147],"make":[148],"clear":[149],"consistently":[156],"able":[157],"class":[164],"are":[167],"unable":[168],"identify.":[170]},"counts_by_year":[],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
