{"id":"https://openalex.org/W4415180146","doi":"https://doi.org/10.23919/ecc65951.2025.11187088","title":"Robust Covert Attack on Cyber-Physical Systems Based on Adaptive Control","display_name":"Robust Covert Attack on Cyber-Physical Systems Based on Adaptive Control","publication_year":2025,"publication_date":"2025-06-24","ids":{"openalex":"https://openalex.org/W4415180146","doi":"https://doi.org/10.23919/ecc65951.2025.11187088"},"language":"en","primary_location":{"id":"doi:10.23919/ecc65951.2025.11187088","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11187088","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106560305","display_name":"Obaidullah Yadgar","orcid":null},"institutions":[{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]},{"id":"https://openalex.org/I73114660","display_name":"University of Applied Sciences Kaiserslautern","ror":"https://ror.org/05dkqa017","country_code":"DE","type":"education","lineage":["https://openalex.org/I73114660"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Obaidullah Yadgar","raw_affiliation_strings":["University of Kaiserslautern-Landau (RPTU),Institute of Automatic Control,Kaiserslautern,Germany,67663"],"affiliations":[{"raw_affiliation_string":"University of Kaiserslautern-Landau (RPTU),Institute of Automatic Control,Kaiserslautern,Germany,67663","institution_ids":["https://openalex.org/I153267046","https://openalex.org/I73114660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000873881","display_name":"Ping Zhang","orcid":"https://orcid.org/0000-0002-9620-8193"},"institutions":[{"id":"https://openalex.org/I73114660","display_name":"University of Applied Sciences Kaiserslautern","ror":"https://ror.org/05dkqa017","country_code":"DE","type":"education","lineage":["https://openalex.org/I73114660"]},{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ping Zhang","raw_affiliation_strings":["University of Kaiserslautern-Landau (RPTU),Institute of Automatic Control,Kaiserslautern,Germany,67663"],"affiliations":[{"raw_affiliation_string":"University of Kaiserslautern-Landau (RPTU),Institute of Automatic Control,Kaiserslautern,Germany,67663","institution_ids":["https://openalex.org/I153267046","https://openalex.org/I73114660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5106560305"],"corresponding_institution_ids":["https://openalex.org/I153267046","https://openalex.org/I73114660"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39594089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"148"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.9279999732971191,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.9279999732971191,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9168000221252441,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.9032999873161316,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7369999885559082},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6987000107765198},{"id":"https://openalex.org/keywords/adaptive-control","display_name":"Adaptive control","score":0.49300000071525574},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4239000082015991},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.38199999928474426},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.37700000405311584},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.36970001459121704}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7369999885559082},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6987000107765198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6320000290870667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5702000260353088},{"id":"https://openalex.org/C107464732","wikidata":"https://www.wikidata.org/wiki/Q235781","display_name":"Adaptive control","level":3,"score":0.49300000071525574},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4239000082015991},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.38199999928474426},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.37700000405311584},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.36970001459121704},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.36149999499320984},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.29820001125335693},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2890999913215637},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.2752000093460083},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C150189527","wikidata":"https://www.wikidata.org/wiki/Q356674","display_name":"Reference model","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C52970973","wikidata":"https://www.wikidata.org/wiki/Q2497134","display_name":"Adaptive system","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/ecc65951.2025.11187088","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11187088","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Widespread":[0],"application":[1],"of":[2,12,24,35,48,62,78,101,104],"network":[3,84],"in":[4,27],"control":[5,52,58,77],"systems":[6],"has":[7,31],"significantly":[8],"increased":[9],"the":[10,29,36,49,71,76,79,82,89,99],"risk":[11,100],"cyber":[13,25],"attacks.":[14,108],"In":[15],"this":[16,102],"paper,":[17],"we":[18],"have":[19],"investigated":[20],"a":[21],"specific":[22],"class":[23],"attack":[26,43],"which":[28],"adversary":[30,39,72],"partial":[32],"model":[33,55],"information":[34],"plant.":[37],"The":[38],"can":[40,66,73],"make":[41],"his":[42],"stealthy":[44,106],"by":[45,88],"applying":[46],"one":[47],"well-known":[50],"adaptive":[51,57],"approaches":[53],"called":[54],"reference":[56],"(MRAC).":[59],"This":[60],"kind":[61,103],"robust":[63,105],"covert":[64,107],"attacks":[65],"be":[67],"very":[68],"dangerous":[69],"as":[70],"take":[74],"over":[75],"plant":[80],"through":[81],"communication":[83],"without":[85],"being":[86],"noticed":[87],"monitoring":[90],"system.":[91],"A":[92],"simulation":[93],"example":[94],"is":[95],"used":[96],"to":[97],"illustrate":[98]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-15T00:00:00"}
