{"id":"https://openalex.org/W4415179411","doi":"https://doi.org/10.23919/ecc65951.2025.11186849","title":"Behavioral Switching in CPS Security: Challenges and Opportunities","display_name":"Behavioral Switching in CPS Security: Challenges and Opportunities","publication_year":2025,"publication_date":"2025-06-24","ids":{"openalex":"https://openalex.org/W4415179411","doi":"https://doi.org/10.23919/ecc65951.2025.11186849"},"language":"en","primary_location":{"id":"doi:10.23919/ecc65951.2025.11186849","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11186849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058970736","display_name":"Aris Kanellopoulos","orcid":"https://orcid.org/0000-0001-5983-0875"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Aris Kanellopoulos","raw_affiliation_strings":["KTH Royal Institute of Technology,Division of Decision and Control Systems, School of Electrical Engineering and Computer Science,Stockholm,Sweden,10044"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology,Division of Decision and Control Systems, School of Electrical Engineering and Computer Science,Stockholm,Sweden,10044","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5058970736"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37889046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1523","last_page":"1523"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9690999984741211,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9690999984741211,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7950999736785889},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6438000202178955},{"id":"https://openalex.org/keywords/mechanism-design","display_name":"Mechanism design","score":0.35429999232292175},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.33570000529289246},{"id":"https://openalex.org/keywords/hybrid-system","display_name":"Hybrid system","score":0.33070001006126404},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.2874000072479248}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7950999736785889},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6438000202178955},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6074000000953674},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4226999878883362},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.35429999232292175},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.33570000529289246},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.33070001006126404},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3041999936103821},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.30070000886917114},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29580000042915344},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.26919999718666077},{"id":"https://openalex.org/C3018651601","wikidata":"https://www.wikidata.org/wiki/Q183635","display_name":"Feedback control","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C47822265","wikidata":"https://www.wikidata.org/wiki/Q854457","display_name":"Complex system","level":2,"score":0.25929999351501465}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/ecc65951.2025.11186849","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11186849","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"We":[0,51],"highlight":[1],"the":[2,33,36,40,46,55,91],"emergence":[3],"of":[4,26,35,43,57,93],"hybrid":[5,96],"phenomena":[6],"in":[7,106],"security":[8,101],"applications":[9],"involving":[10],"cyber-physical":[11,107],"systems.":[12],"Leveraging":[13],"results":[14],"from":[15],"differential":[16],"games,":[17],"we":[18,75],"apply":[19],"online":[20],"deterministic":[21],"annealing":[22],"on":[23,45,59,69],"a":[24,66,77],"space":[25],"potential":[27],"attacking":[28],"behaviors":[29],"that":[30,83,95],"can":[31,62],"inform":[32],"defender":[34],"system":[37,97],"about":[38],"both":[39],"different":[41],"types":[42],"attackers":[44],"environment":[47],"and":[48,103],"their":[49],"distribution.":[50],"further":[52],"showcase":[53],"how":[54],"complexity":[56],"switching":[58,79],"dynamical":[60],"systems":[61],"be":[63],"employed":[64],"as":[65,109,112,114],"defensive":[67],"tool":[68],"its":[70],"own":[71],"merit.":[72],"Towards":[73],"this,":[74],"develop":[76],"probabilistic":[78],"feedback":[80],"control":[81],"mechanism":[82],"deceives":[84],"an":[85],"adversarial":[86],"identifier.":[87],"Our":[88],"studies":[89],"underscore":[90],"plethora":[92],"opportunities":[94],"methods":[98],"present":[99],"for":[100],"analysts":[102],"defense":[104],"experts":[105],"systems;":[108],"detection":[110],"approaches":[111],"well":[113],"design":[115],"techniques.":[116]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-15T00:00:00"}
