Discrete-event systems subject to unknown sensor attacks

This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable...

Full description

Saved in:
Bibliographic Details
Published inDiscrete event dynamic systems Vol. 32; no. 1; pp. 143 - 158
Main Authors Alves, Michel R. C., Pena, Patrícia N., Rudie, Karen
Format Journal Article
LanguageEnglish
Published New York Springer US 01.03.2022
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the attack set . We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton.
AbstractList This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the attack set. We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton.
This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the attack set . We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton.
Author Rudie, Karen
Alves, Michel R. C.
Pena, Patrícia N.
Author_xml – sequence: 1
  givenname: Michel R. C.
  orcidid: 0000-0003-4083-5654
  surname: Alves
  fullname: Alves, Michel R. C.
  email: michelrodrigo@ufmg.br
  organization: Graduate Program in Electrical Engineering, Universidade Federal de Minas Gerais
– sequence: 2
  givenname: Patrícia N.
  surname: Pena
  fullname: Pena, Patrícia N.
  organization: Department of Electronics Engineering, Universidade Federal de Minas Gerais
– sequence: 3
  givenname: Karen
  surname: Rudie
  fullname: Rudie, Karen
  organization: Department of Electrical and Computer Engineering, and Ingenuity Labs Research Institute, Queen’s University
BookMark eNp9kE1LAzEQhoNUsFX_gKcFz9HJZr9ylPoJBS96DtnsRLYfSc2kSv-9qysIHnqay_PMO_PO2MQHj4xdCLgSAPU1CajyikMuOIAsBZdHbCrKWvK6VMWETUHlBa9qkCdsRrSEgVJQTllz25ONmJDjB_qU0Z4SbiijXbtEm7IUsp1f-fDpM0JPIWYmJWNXdMaOnVkTnv_OU_Z6f_cyf-SL54en-c2CWylU4sqopu5KQHSuEBIbkEWFaDunaiFkh-CUs2UFqmnL1jQCrUPMW1so6TrbyVN2Oe7dxvC-Q0p6GXbRD5E6r4YfctFIGKh8pGwMRBGd3sZ-Y-JeC9DfDemxIT3w-qchLQep-SfZPpnUB5-i6deHVTmqNOT4N4x_Vx2wvgABdH1x
CitedBy_id crossref_primary_10_1007_s10626_024_00408_z
crossref_primary_10_1038_s41598_022_19737_w
crossref_primary_10_1016_j_ifacol_2024_07_032
crossref_primary_10_1016_j_ifacol_2024_07_002
crossref_primary_10_1016_j_arcontrol_2023_100907
crossref_primary_10_1016_j_ifacol_2023_10_417
crossref_primary_10_1007_s10626_024_00401_6
crossref_primary_10_1109_TAC_2023_3329341
Cites_doi 10.1109/SMC.2019.8914035
10.1023/B:DISC.0000005009.40749.b6
10.1109/CDC40024.2019.9030171
10.1016/j.ifacol.2021.04.069
10.1016/j.sysconle.2007.03.006
10.1007/s40313-018-0420-9
10.1016/j.automatica.2018.07.017
10.1109/TAC.2019.2897553
10.1016/j.automatica.2020.109172
10.1109/CDC40024.2019.9029767
10.1016/j.ifacol.2021.04.001
10.1016/j.ifacol.2018.06.314
10.23919/ECC.2019.8795849
10.1016/j.automatica.2018.04.006
10.1007/s13235-018-0285-3
10.1007/978-0-387-68612-7
10.1142/S2424862217500142
10.1007/s10626-020-00312-2
10.1109/ETFA.2018.8502501
10.1109/WODES.2016.7497863
ContentType Journal Article
Copyright The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
Copyright_xml – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021
– notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.
DBID AAYXX
CITATION
DOI 10.1007/s10626-021-00351-3
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Mathematics
EISSN 1573-7594
EndPage 158
ExternalDocumentID 10_1007_s10626_021_00351_3
GroupedDBID -52
-5D
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
2.D
203
28-
29G
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
6TJ
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFEXP
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BAPOH
BBWZM
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P9R
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCLPG
SDD
SDH
SDM
SHX
SISQX
SJYHP
SMT
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WH7
WK8
YLTOR
Z45
ZMTXR
ZWQNP
~A9
~EX
AAPKM
AAYXX
ABBRH
ABDBE
ADHKG
AFDZB
AFOHR
AGQPQ
AHPBZ
ATHPR
AYFIA
CITATION
ABRTQ
ID FETCH-LOGICAL-c319t-9a987d50eeff413e80346eecdf97113de0f9fc56098b5ba81ecfee2bc493fdcd3
IEDL.DBID U2A
ISSN 0924-6703
IngestDate Fri Jul 25 10:53:32 EDT 2025
Thu Apr 24 23:01:03 EDT 2025
Tue Jul 01 00:59:22 EDT 2025
Fri Feb 21 02:47:23 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Attacks on output symbols
Supervisory control
Discrete-event system
P-observability
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-9a987d50eeff413e80346eecdf97113de0f9fc56098b5ba81ecfee2bc493fdcd3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4083-5654
PQID 2639021830
PQPubID 2043751
PageCount 16
ParticipantIDs proquest_journals_2639021830
crossref_primary_10_1007_s10626_021_00351_3
crossref_citationtrail_10_1007_s10626_021_00351_3
springer_journals_10_1007_s10626_021_00351_3
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-03-01
PublicationDateYYYYMMDD 2022-03-01
PublicationDate_xml – month: 03
  year: 2022
  text: 2022-03-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationSubtitle Theory and Applications
PublicationTitle Discrete event dynamic systems
PublicationTitleAbbrev Discrete Event Dyn Syst
PublicationYear 2022
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Lu Y (2017) Cyber physical system (CPS)-based industry 4.0: A Survey. J Ind Integr Manag 02(03):17500141–175001457
Rashidinejad A, Lin L, Wetzels B, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. In: Proceedings of the 18th European Control Conference. EUCA, pp 1732–1739
Zhang Q, Seatzu C, Li Z, Giua A (2021) State estimation under attack in partially-observed discrete event systems. arXiv:https://arxiv.org/abs/1906.10207v3
Cassandras C, Lafortune S (2007) Introduction to Discrete Event Systems, 2nd edn. Springer, New York
Gao C, Seatzu C, Li Z, Giua A (2019) Multiple attacks detection on discrete event systems. IEEE International Conference on Systems, Man and Cybernetics, pp 2352–2357
SuRWonhamWMSupervisor reduction for discrete-event systemsDiscret Event Dyn Syst2004143153203231110.1023/B:DISC.0000005009.40749.b6
LimaPMAlvesMVSCarvalhoLKMoreiraMVSecurity against communication network attacks of cyber-physical systemsJ Control Autom Electr Syst201930112513510.1007/s40313-018-0420-9
Meira-GóesRLafortuneSMarchandHSynthesis of supervisors robust against sensor deception attacksIEEE Trans Autom Control20219286c18432005807479709
Zhang Q, Li Z, Seatzu C, Giua A (2018) Stealthy attacks for partially-observed discrete event systems. IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 1161–1164
CarvalhoLKWuYCKwongRLafortuneSDetection and mitigation of classes of attacks in supervisory control systemsAutomatica201897121133385745310.1016/j.automatica.2018.07.017
Lin L, Su R (2020) Synthesis of covert actuator and sensor attackers as supervisor synthesis. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, vol 1-6, pp 561–577
Lin L, Zhu Y, Su R (2019) Towards bounded synthesis of resilient supervisors against actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 7659–7664
WangWLafortuneSLinFAn algorithm for calculating indistinguishable states and clusters in Finite-State automata with partially observable transitionsSyst Control Lett2007569-10656661234465410.1016/j.sysconle.2007.03.006
Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. 13th International Workshop on Discrete Event Systems, pp 298–305
Meira-GóesRKangEKwongRHLafortuneSSynthesis of sensor deception attacks at the supervisory layer of Cyber–Physical systemsAutomatica2020121109172413352310.1016/j.automatica.2020.109172
WakaikiMTabuadaPHespanhaJPSupervisory control of discrete-event systems under attacksDyn Games Appl201994965983403194310.1007/s13235-018-0285-3
Wang Y, Pajic M (2019) Supervisory control of discrete event systems in the presence of sensor and actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 5350–5355
Li Y, Tong Y, Giua A (2020) Detection and prevention of cyber attacks in networked control systems. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 7–13
FritzRZhangPModeling and detection of cyber attacks on discrete event systemsIFAC-PapersOnLine201851728529010.1016/j.ifacol.2018.06.314
JiYYinXLafortuneSOpacity enforcement using nondeterministic publicly known edit functionsIEEE Trans Autom Control2019641043694376401709210.1109/TAC.2019.2897553
Mohajerani S, Meira-Góes R, Lafortune S (2020) Efficient synthesis of sensor deception attacks using observation Equivalence-Based abstraction. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 28–34
SuRSupervisor synthesis to thwart cyber attack with bounded sensor reading alterationsAutomatica2018943544381095310.1016/j.automatica.2018.04.006
351_CR10
351_CR21
351_CR11
351_CR22
351_CR20
R Meira-Góes (351_CR12) 2020; 121
W Wang (351_CR19) 2007; 56
R Meira-Góes (351_CR13) 2021; 9286
M Wakaiki (351_CR18) 2019; 9
R Su (351_CR16) 2018; 94
351_CR7
Y Ji (351_CR6) 2019; 64
351_CR9
351_CR3
R Fritz (351_CR4) 2018; 51
351_CR5
351_CR14
R Su (351_CR17) 2004; 14
351_CR15
LK Carvalho (351_CR2) 2018; 97
351_CR1
PM Lima (351_CR8) 2019; 30
References_xml – reference: Zhang Q, Li Z, Seatzu C, Giua A (2018) Stealthy attacks for partially-observed discrete event systems. IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 1161–1164
– reference: Lin L, Su R (2020) Synthesis of covert actuator and sensor attackers as supervisor synthesis. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, vol 1-6, pp 561–577
– reference: Meira-GóesRLafortuneSMarchandHSynthesis of supervisors robust against sensor deception attacksIEEE Trans Autom Control20219286c18432005807479709
– reference: Rashidinejad A, Lin L, Wetzels B, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. In: Proceedings of the 18th European Control Conference. EUCA, pp 1732–1739
– reference: SuRSupervisor synthesis to thwart cyber attack with bounded sensor reading alterationsAutomatica2018943544381095310.1016/j.automatica.2018.04.006
– reference: FritzRZhangPModeling and detection of cyber attacks on discrete event systemsIFAC-PapersOnLine201851728529010.1016/j.ifacol.2018.06.314
– reference: Mohajerani S, Meira-Góes R, Lafortune S (2020) Efficient synthesis of sensor deception attacks using observation Equivalence-Based abstraction. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 28–34
– reference: Li Y, Tong Y, Giua A (2020) Detection and prevention of cyber attacks in networked control systems. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 7–13
– reference: Cassandras C, Lafortune S (2007) Introduction to Discrete Event Systems, 2nd edn. Springer, New York
– reference: Lin L, Zhu Y, Su R (2019) Towards bounded synthesis of resilient supervisors against actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 7659–7664
– reference: SuRWonhamWMSupervisor reduction for discrete-event systemsDiscret Event Dyn Syst2004143153203231110.1023/B:DISC.0000005009.40749.b6
– reference: Zhang Q, Seatzu C, Li Z, Giua A (2021) State estimation under attack in partially-observed discrete event systems. arXiv:https://arxiv.org/abs/1906.10207v3
– reference: WakaikiMTabuadaPHespanhaJPSupervisory control of discrete-event systems under attacksDyn Games Appl201994965983403194310.1007/s13235-018-0285-3
– reference: Meira-GóesRKangEKwongRHLafortuneSSynthesis of sensor deception attacks at the supervisory layer of Cyber–Physical systemsAutomatica2020121109172413352310.1016/j.automatica.2020.109172
– reference: CarvalhoLKWuYCKwongRLafortuneSDetection and mitigation of classes of attacks in supervisory control systemsAutomatica201897121133385745310.1016/j.automatica.2018.07.017
– reference: LimaPMAlvesMVSCarvalhoLKMoreiraMVSecurity against communication network attacks of cyber-physical systemsJ Control Autom Electr Syst201930112513510.1007/s40313-018-0420-9
– reference: Wang Y, Pajic M (2019) Supervisory control of discrete event systems in the presence of sensor and actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 5350–5355
– reference: JiYYinXLafortuneSOpacity enforcement using nondeterministic publicly known edit functionsIEEE Trans Autom Control2019641043694376401709210.1109/TAC.2019.2897553
– reference: Lu Y (2017) Cyber physical system (CPS)-based industry 4.0: A Survey. J Ind Integr Manag 02(03):17500141–175001457
– reference: Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. 13th International Workshop on Discrete Event Systems, pp 298–305
– reference: Gao C, Seatzu C, Li Z, Giua A (2019) Multiple attacks detection on discrete event systems. IEEE International Conference on Systems, Man and Cybernetics, pp 2352–2357
– reference: WangWLafortuneSLinFAn algorithm for calculating indistinguishable states and clusters in Finite-State automata with partially observable transitionsSyst Control Lett2007569-10656661234465410.1016/j.sysconle.2007.03.006
– ident: 351_CR5
  doi: 10.1109/SMC.2019.8914035
– volume: 14
  start-page: 31
  year: 2004
  ident: 351_CR17
  publication-title: Discret Event Dyn Syst
  doi: 10.1023/B:DISC.0000005009.40749.b6
– ident: 351_CR10
  doi: 10.1109/CDC40024.2019.9030171
– ident: 351_CR14
  doi: 10.1016/j.ifacol.2021.04.069
– volume: 56
  start-page: 656
  issue: 9-10
  year: 2007
  ident: 351_CR19
  publication-title: Syst Control Lett
  doi: 10.1016/j.sysconle.2007.03.006
– volume: 30
  start-page: 125
  issue: 1
  year: 2019
  ident: 351_CR8
  publication-title: J Control Autom Electr Syst
  doi: 10.1007/s40313-018-0420-9
– volume: 97
  start-page: 121
  year: 2018
  ident: 351_CR2
  publication-title: Automatica
  doi: 10.1016/j.automatica.2018.07.017
– volume: 64
  start-page: 4369
  issue: 10
  year: 2019
  ident: 351_CR6
  publication-title: IEEE Trans Autom Control
  doi: 10.1109/TAC.2019.2897553
– volume: 121
  start-page: 109172
  year: 2020
  ident: 351_CR12
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.109172
– ident: 351_CR20
  doi: 10.1109/CDC40024.2019.9029767
– ident: 351_CR7
  doi: 10.1016/j.ifacol.2021.04.001
– volume: 51
  start-page: 285
  issue: 7
  year: 2018
  ident: 351_CR4
  publication-title: IFAC-PapersOnLine
  doi: 10.1016/j.ifacol.2018.06.314
– ident: 351_CR15
  doi: 10.23919/ECC.2019.8795849
– volume: 94
  start-page: 35
  year: 2018
  ident: 351_CR16
  publication-title: Automatica
  doi: 10.1016/j.automatica.2018.04.006
– ident: 351_CR22
– volume: 9
  start-page: 965
  issue: 4
  year: 2019
  ident: 351_CR18
  publication-title: Dyn Games Appl
  doi: 10.1007/s13235-018-0285-3
– ident: 351_CR3
  doi: 10.1007/978-0-387-68612-7
– ident: 351_CR11
  doi: 10.1142/S2424862217500142
– ident: 351_CR9
  doi: 10.1007/s10626-020-00312-2
– ident: 351_CR21
  doi: 10.1109/ETFA.2018.8502501
– ident: 351_CR1
  doi: 10.1109/WODES.2016.7497863
– volume: 9286
  start-page: 1
  issue: c
  year: 2021
  ident: 351_CR13
  publication-title: IEEE Trans Autom Control
SSID ssj0003905
Score 2.34503
Snippet This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 143
SubjectTerms Algorithms
Control
Convex and Discrete Geometry
Discrete event systems
Electrical Engineering
Machines
Manufacturing
Mathematics
Mathematics and Statistics
Operations Research/Decision Theory
Processes
Supervisory control
Systems Theory
Visual observation
Title Discrete-event systems subject to unknown sensor attacks
URI https://link.springer.com/article/10.1007/s10626-021-00351-3
https://www.proquest.com/docview/2639021830
Volume 32
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED1Bu8CA-BSBUnlgA0uJnS-PFbRUoDJRqUxR7NgSEkpRk_5_zm7SFgRIjFEcDy9n3zv77h3AdZSLFN02o8qwhFqFOZryQqMt8zwQMpHS9QacPMfjafg4i2ZNUVjVZru3V5Jup94qdkPyTW1Kgbv-onwXupGN3dGKp2yw3n8xineJixhZ0BgNuimV-XmOr-5owzG_XYs6bzM6hIOGJpLB6r8ewY4uj2F_SzwQnyZrxdXqBNL7N9wAkAFTJ8lEVgrNFamW0p60kHpOlqU9QCtJhZHrfEHyurb19acwHQ1f7sa06YpAFS6XmgpENykiX2tj0APp1OdhrLUqjEiCAHH2jTAKiYxIZSTzNNDKaM2kCgU3hSr4GXTKeanPgQiMX5BA5TyWIkw0jo5cF9A8Z34imfEgaMHJVCMZbjtXvGcbsWMLaIaAZg7QjHtws_7mYyWY8efoXot51iyeKmPImhx18z24bf_D5vXvs138b_gl7DFbzOAyynrQqRdLfYUUo5Z96A4eXp-GfWdZn2x1xuI
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BGYAB8RSFAh7YwFJi5-WxAqoCbadW6mbFiS0hoRQ16f_n7CZtQYDEGMX28Plx39l33wHchqlI0GwzmhkWU6swRxOea1zLPPWFipVytQGHo6g_CV6m4bROCiubaPfmSdKd1BvJbki-qQ0pcM9flG_DDg6e2ECuCeuuzl_04l3gInoWNMIFXafK_DzGV3O05pjfnkWdtekdwkFNE0l3Oa9HsKWLY9jfEA_Er-FKcbU8geTxDQ8AZMDUSTKRpUJzScqFsjctpJqRRWEv0ApSouc6m5O0qmx-_SlMek_jhz6tqyLQDLdLRQWiG-ehp7UxaIF04vEg0jrLjYh9H3H2jDAZEhmRqFClia8zozVTWSC4ybOcn0GrmBX6HIhA_wUJVMojJYJYY-vQVQFNU-bFipk2-A04Mqslw23line5Fju2gEoEVDpAJW_D3arPx1Iw48_WnQZzWW-eUjJkTY66eW24b-Zh_fv30S7-1_wGdvvj4UAOnkevl7DHbGKDiy7rQKuaL_QV0o1KXbvV9Qmx9MhB
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFA46QfRBvOJ0ah5807A26S2PQx3zsuGDg72FJk1AkG6s3f_3JG23KSr4WJoG8uU0-U5yzncQug5TnsC2TYkyNCZWYY4kLNNgyyz1uYyldLUBh6NoMA6eJuFkLYvfRbs3V5JVToNVacrL7iwz3bXENyDixIYXuKswwjbRFizHvrXrMe0t12Lw6F0QI3gZJALjrtNmfu7j69a04pvfrkjdztPfR3s1ZcS9ao4P0IbOD9HumpAgPA2X6qvFEUru32ExADZMnDwTrtSaC1wspD11weUUL3J7mJbjArzY6RynZWlz7Y_RuP_wdjcgdYUEomCsJeGAdJyFntbGwPB14rEg0lplhse-D5h7hhsFpIYnMpRp4mtltKZSBZyZTGXsBLXyaa5PEebgywCZSlkkeRBraB26iqBpSr1YUtNGfgOOULV8uK1i8SFWwscWUAGACgeoYG10s_xmVoln_Nm602Au6h-pEBQYlKNxXhvdNvOwev17b2f_a36Ftl_v--LlcfR8jnaozXFwgWYd1CrnC30BzKOUl864PgGfWMx9
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Discrete-event+systems+subject+to+unknown+sensor+attacks&rft.jtitle=Discrete+event+dynamic+systems&rft.au=Alves%2C+Michel+R.+C.&rft.au=Pena%2C+Patr%C3%ADcia+N.&rft.au=Rudie%2C+Karen&rft.date=2022-03-01&rft.issn=0924-6703&rft.eissn=1573-7594&rft.volume=32&rft.issue=1&rft.spage=143&rft.epage=158&rft_id=info:doi/10.1007%2Fs10626-021-00351-3&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10626_021_00351_3
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-6703&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-6703&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-6703&client=summon