{"id":"https://openalex.org/W4415179572","doi":"https://doi.org/10.23919/ecc65951.2025.11187261","title":"Data-Driven Attack Detection for Networked Control Systems","display_name":"Data-Driven Attack Detection for Networked Control Systems","publication_year":2025,"publication_date":"2025-06-24","ids":{"openalex":"https://openalex.org/W4415179572","doi":"https://doi.org/10.23919/ecc65951.2025.11187261"},"language":"en","primary_location":{"id":"doi:10.23919/ecc65951.2025.11187261","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11187261","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.tue.nl/ws/files/376980944/Data-Driven_Attack_Detection_for_Networked_Control_Systems_1_.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019166344","display_name":"Sribalaji C. Anand","orcid":"https://orcid.org/0000-0002-9948-4118"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Sribalaji C. Anand","raw_affiliation_strings":["KTH Royal Institute of Technology,Sweden"],"affiliations":[{"raw_affiliation_string":"KTH Royal Institute of Technology,Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083231405","display_name":"M. S. Chong","orcid":"https://orcid.org/0000-0002-7324-1660"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Michelle S. Chong","raw_affiliation_strings":["Eindhoven University of Technology,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081810653","display_name":"Andr\u00e9 Teixeira","orcid":"https://orcid.org/0000-0001-5491-4068"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Andr\u00e9 M. H. Teixeira","raw_affiliation_strings":["Uppsala University,Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University,Sweden","institution_ids":["https://openalex.org/I123387679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019166344"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33069684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1070","last_page":"1077"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9646999835968018,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.5372999906539917},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.4462999999523163},{"id":"https://openalex.org/keywords/networked-control-system","display_name":"Networked control system","score":0.4120999872684479},{"id":"https://openalex.org/keywords/operator","display_name":"Operator (biology)","score":0.4034000039100647},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.3723999857902527},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37070000171661377}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5861999988555908},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.5372999906539917},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4717999994754791},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.4462999999523163},{"id":"https://openalex.org/C1759631","wikidata":"https://www.wikidata.org/wiki/Q9336345","display_name":"Networked control system","level":3,"score":0.4120999872684479},{"id":"https://openalex.org/C17020691","wikidata":"https://www.wikidata.org/wiki/Q139677","display_name":"Operator (biology)","level":5,"score":0.4034000039100647},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.3723999857902527},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37070000171661377},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.27619999647140503},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27480000257492065},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.27309998869895935},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26429998874664307},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.25600001215934753},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25189998745918274}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/ecc65951.2025.11187261","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11187261","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:openaire/7fb208a2-fe8d-4e1e-80f7-be18bddfeb79","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/7fb208a2-fe8d-4e1e-80f7-be18bddfeb79","pdf_url":"https://pure.tue.nl/ws/files/376980944/Data-Driven_Attack_Detection_for_Networked_Control_Systems_1_.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Coimbatore Anand, S, Chong, M S & Teixeira, A M H 2025, Data-Driven Attack Detection for Networked Control Systems. in 2025 European Control Conference, ECC., 11187261, Institute of Electrical and Electronics Engineers, pp. 1070-1077, 23rd European Control Conference 2025, Thessaloniki, Greece, 24/06/25. https://doi.org/10.23919/ECC65951.2025.11187261","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:openaire/7fb208a2-fe8d-4e1e-80f7-be18bddfeb79","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/7fb208a2-fe8d-4e1e-80f7-be18bddfeb79","pdf_url":"https://pure.tue.nl/ws/files/376980944/Data-Driven_Attack_Detection_for_Networked_Control_Systems_1_.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Coimbatore Anand, S, Chong, M S & Teixeira, A M H 2025, Data-Driven Attack Detection for Networked Control Systems. in 2025 European Control Conference, ECC., 11187261, Institute of Electrical and Electronics Engineers, pp. 1070-1077, 23rd European Control Conference 2025, Thessaloniki, Greece, 24/06/25. https://doi.org/10.23919/ECC65951.2025.11187261","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2943129823","display_name":null,"funder_award_id":"2018-04396","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"},{"id":"https://openalex.org/G712881263","display_name":null,"funder_award_id":"2018-","funder_id":"https://openalex.org/F4320322581","funder_display_name":"Vetenskapsr\u00e5det"}],"funders":[{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"},{"id":"https://openalex.org/F4320322509","display_name":"Kungliga Tekniska H\u00f6gskolan","ror":"https://ror.org/026vcq606"},{"id":"https://openalex.org/F4320322581","display_name":"Vetenskapsr\u00e5det","ror":"https://ror.org/03zttf063"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415179572.pdf","grobid_xml":"https://content.openalex.org/works/W4415179572.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1972523481","https://openalex.org/W2062132646","https://openalex.org/W2565344933","https://openalex.org/W2734814867","https://openalex.org/W2737875000","https://openalex.org/W2904710589","https://openalex.org/W2995764727","https://openalex.org/W3011481131","https://openalex.org/W3183719284","https://openalex.org/W3202901906","https://openalex.org/W3211875090","https://openalex.org/W3216349435","https://openalex.org/W4310584416","https://openalex.org/W4312874178","https://openalex.org/W4312910489","https://openalex.org/W4313644371","https://openalex.org/W4320002656","https://openalex.org/W4327522035","https://openalex.org/W4388666692","https://openalex.org/W4388903534","https://openalex.org/W4400488657"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,12,41,89],"data-driven":[4,42],"framework":[5],"to":[6,30,46,82],"identify":[7,47,83],"the":[8,19,36,48,52,64,67,71,78,84],"attack-free":[9,33,49],"sensors":[10,20,50,85],"in":[11],"networked":[13],"control":[14],"system":[15],"when":[16,51],"some":[17],"of":[18,35,66,77,91,101],"are":[21],"corrupted":[22],"by":[23],"an":[24],"adversary.":[25],"An":[26,75],"operator":[27],"with":[28],"access":[29],"offline":[31],"input-output":[32],"trajectories":[34],"plant":[37,53],"is":[38,44,54,73,80,104],"considered.":[39],"Then,":[40],"algorithm":[43,72,79,103],"proposed":[45],"controlled":[55],"online.":[56],"We":[57],"also":[58],"provide":[59],"necessary":[60],"conditions,":[61],"based":[62],"on":[63],"properties":[65],"plant,":[68],"under":[69],"which":[70],"feasible.":[74],"extension":[76],"presented":[81],"completely":[86],"online":[87],"against":[88],"class":[90],"replay":[92],"attacks":[93],"and":[94],"network":[95],"delay":[96],"attacks,":[97],"respectively.":[98],"The":[99],"efficacy":[100],"our":[102],"depicted":[105],"through":[106],"numerical":[107],"examples.":[108]},"counts_by_year":[],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-15T00:00:00"}
