Discrete-event systems subject to unknown sensor attacks
This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable...
Saved in:
Published in | Discrete event dynamic systems Vol. 32; no. 1; pp. 143 - 158 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.03.2022
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the
attack set
. We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton. |
---|---|
AbstractList | This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the attack set. We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton. This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the attack set . We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton. |
Author | Rudie, Karen Alves, Michel R. C. Pena, Patrícia N. |
Author_xml | – sequence: 1 givenname: Michel R. C. orcidid: 0000-0003-4083-5654 surname: Alves fullname: Alves, Michel R. C. email: michelrodrigo@ufmg.br organization: Graduate Program in Electrical Engineering, Universidade Federal de Minas Gerais – sequence: 2 givenname: Patrícia N. surname: Pena fullname: Pena, Patrícia N. organization: Department of Electronics Engineering, Universidade Federal de Minas Gerais – sequence: 3 givenname: Karen surname: Rudie fullname: Rudie, Karen organization: Department of Electrical and Computer Engineering, and Ingenuity Labs Research Institute, Queen’s University |
BookMark | eNp9kE1LAzEQhoNUsFX_gKcFz9HJZr9ylPoJBS96DtnsRLYfSc2kSv-9qysIHnqay_PMO_PO2MQHj4xdCLgSAPU1CajyikMuOIAsBZdHbCrKWvK6VMWETUHlBa9qkCdsRrSEgVJQTllz25ONmJDjB_qU0Z4SbiijXbtEm7IUsp1f-fDpM0JPIWYmJWNXdMaOnVkTnv_OU_Z6f_cyf-SL54en-c2CWylU4sqopu5KQHSuEBIbkEWFaDunaiFkh-CUs2UFqmnL1jQCrUPMW1so6TrbyVN2Oe7dxvC-Q0p6GXbRD5E6r4YfctFIGKh8pGwMRBGd3sZ-Y-JeC9DfDemxIT3w-qchLQep-SfZPpnUB5-i6deHVTmqNOT4N4x_Vx2wvgABdH1x |
CitedBy_id | crossref_primary_10_1007_s10626_024_00408_z crossref_primary_10_1038_s41598_022_19737_w crossref_primary_10_1016_j_ifacol_2024_07_032 crossref_primary_10_1016_j_ifacol_2024_07_002 crossref_primary_10_1016_j_arcontrol_2023_100907 crossref_primary_10_1016_j_ifacol_2023_10_417 crossref_primary_10_1007_s10626_024_00401_6 crossref_primary_10_1109_TAC_2023_3329341 |
Cites_doi | 10.1109/SMC.2019.8914035 10.1023/B:DISC.0000005009.40749.b6 10.1109/CDC40024.2019.9030171 10.1016/j.ifacol.2021.04.069 10.1016/j.sysconle.2007.03.006 10.1007/s40313-018-0420-9 10.1016/j.automatica.2018.07.017 10.1109/TAC.2019.2897553 10.1016/j.automatica.2020.109172 10.1109/CDC40024.2019.9029767 10.1016/j.ifacol.2021.04.001 10.1016/j.ifacol.2018.06.314 10.23919/ECC.2019.8795849 10.1016/j.automatica.2018.04.006 10.1007/s13235-018-0285-3 10.1007/978-0-387-68612-7 10.1142/S2424862217500142 10.1007/s10626-020-00312-2 10.1109/ETFA.2018.8502501 10.1109/WODES.2016.7497863 |
ContentType | Journal Article |
Copyright | The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
Copyright_xml | – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021 – notice: The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021. |
DBID | AAYXX CITATION |
DOI | 10.1007/s10626-021-00351-3 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Mathematics |
EISSN | 1573-7594 |
EndPage | 158 |
ExternalDocumentID | 10_1007_s10626_021_00351_3 |
GroupedDBID | -52 -5D -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 2.D 203 28- 29G 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 6TJ 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTV ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFEXP AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BAPOH BBWZM BDATZ BGNMA BSONS CAG COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ KDC KOV KOW LAK LLZTM M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P9R PF0 PT4 PT5 QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SDD SDH SDM SHX SISQX SJYHP SMT SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WH7 WK8 YLTOR Z45 ZMTXR ZWQNP ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ADHKG AFDZB AFOHR AGQPQ AHPBZ ATHPR AYFIA CITATION ABRTQ |
ID | FETCH-LOGICAL-c319t-9a987d50eeff413e80346eecdf97113de0f9fc56098b5ba81ecfee2bc493fdcd3 |
IEDL.DBID | U2A |
ISSN | 0924-6703 |
IngestDate | Fri Jul 25 10:53:32 EDT 2025 Thu Apr 24 23:01:03 EDT 2025 Tue Jul 01 00:59:22 EDT 2025 Fri Feb 21 02:47:23 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Attacks on output symbols Supervisory control Discrete-event system P-observability |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-9a987d50eeff413e80346eecdf97113de0f9fc56098b5ba81ecfee2bc493fdcd3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4083-5654 |
PQID | 2639021830 |
PQPubID | 2043751 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2639021830 crossref_primary_10_1007_s10626_021_00351_3 crossref_citationtrail_10_1007_s10626_021_00351_3 springer_journals_10_1007_s10626_021_00351_3 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-03-01 |
PublicationDateYYYYMMDD | 2022-03-01 |
PublicationDate_xml | – month: 03 year: 2022 text: 2022-03-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationSubtitle | Theory and Applications |
PublicationTitle | Discrete event dynamic systems |
PublicationTitleAbbrev | Discrete Event Dyn Syst |
PublicationYear | 2022 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Lu Y (2017) Cyber physical system (CPS)-based industry 4.0: A Survey. J Ind Integr Manag 02(03):17500141–175001457 Rashidinejad A, Lin L, Wetzels B, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. In: Proceedings of the 18th European Control Conference. EUCA, pp 1732–1739 Zhang Q, Seatzu C, Li Z, Giua A (2021) State estimation under attack in partially-observed discrete event systems. arXiv:https://arxiv.org/abs/1906.10207v3 Cassandras C, Lafortune S (2007) Introduction to Discrete Event Systems, 2nd edn. Springer, New York Gao C, Seatzu C, Li Z, Giua A (2019) Multiple attacks detection on discrete event systems. IEEE International Conference on Systems, Man and Cybernetics, pp 2352–2357 SuRWonhamWMSupervisor reduction for discrete-event systemsDiscret Event Dyn Syst2004143153203231110.1023/B:DISC.0000005009.40749.b6 LimaPMAlvesMVSCarvalhoLKMoreiraMVSecurity against communication network attacks of cyber-physical systemsJ Control Autom Electr Syst201930112513510.1007/s40313-018-0420-9 Meira-GóesRLafortuneSMarchandHSynthesis of supervisors robust against sensor deception attacksIEEE Trans Autom Control20219286c18432005807479709 Zhang Q, Li Z, Seatzu C, Giua A (2018) Stealthy attacks for partially-observed discrete event systems. IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 1161–1164 CarvalhoLKWuYCKwongRLafortuneSDetection and mitigation of classes of attacks in supervisory control systemsAutomatica201897121133385745310.1016/j.automatica.2018.07.017 Lin L, Su R (2020) Synthesis of covert actuator and sensor attackers as supervisor synthesis. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, vol 1-6, pp 561–577 Lin L, Zhu Y, Su R (2019) Towards bounded synthesis of resilient supervisors against actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 7659–7664 WangWLafortuneSLinFAn algorithm for calculating indistinguishable states and clusters in Finite-State automata with partially observable transitionsSyst Control Lett2007569-10656661234465410.1016/j.sysconle.2007.03.006 Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. 13th International Workshop on Discrete Event Systems, pp 298–305 Meira-GóesRKangEKwongRHLafortuneSSynthesis of sensor deception attacks at the supervisory layer of Cyber–Physical systemsAutomatica2020121109172413352310.1016/j.automatica.2020.109172 WakaikiMTabuadaPHespanhaJPSupervisory control of discrete-event systems under attacksDyn Games Appl201994965983403194310.1007/s13235-018-0285-3 Wang Y, Pajic M (2019) Supervisory control of discrete event systems in the presence of sensor and actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 5350–5355 Li Y, Tong Y, Giua A (2020) Detection and prevention of cyber attacks in networked control systems. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 7–13 FritzRZhangPModeling and detection of cyber attacks on discrete event systemsIFAC-PapersOnLine201851728529010.1016/j.ifacol.2018.06.314 JiYYinXLafortuneSOpacity enforcement using nondeterministic publicly known edit functionsIEEE Trans Autom Control2019641043694376401709210.1109/TAC.2019.2897553 Mohajerani S, Meira-Góes R, Lafortune S (2020) Efficient synthesis of sensor deception attacks using observation Equivalence-Based abstraction. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 28–34 SuRSupervisor synthesis to thwart cyber attack with bounded sensor reading alterationsAutomatica2018943544381095310.1016/j.automatica.2018.04.006 351_CR10 351_CR21 351_CR11 351_CR22 351_CR20 R Meira-Góes (351_CR12) 2020; 121 W Wang (351_CR19) 2007; 56 R Meira-Góes (351_CR13) 2021; 9286 M Wakaiki (351_CR18) 2019; 9 R Su (351_CR16) 2018; 94 351_CR7 Y Ji (351_CR6) 2019; 64 351_CR9 351_CR3 R Fritz (351_CR4) 2018; 51 351_CR5 351_CR14 R Su (351_CR17) 2004; 14 351_CR15 LK Carvalho (351_CR2) 2018; 97 351_CR1 PM Lima (351_CR8) 2019; 30 |
References_xml | – reference: Zhang Q, Li Z, Seatzu C, Giua A (2018) Stealthy attacks for partially-observed discrete event systems. IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp 1161–1164 – reference: Lin L, Su R (2020) Synthesis of covert actuator and sensor attackers as supervisor synthesis. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, vol 1-6, pp 561–577 – reference: Meira-GóesRLafortuneSMarchandHSynthesis of supervisors robust against sensor deception attacksIEEE Trans Autom Control20219286c18432005807479709 – reference: Rashidinejad A, Lin L, Wetzels B, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. In: Proceedings of the 18th European Control Conference. EUCA, pp 1732–1739 – reference: SuRSupervisor synthesis to thwart cyber attack with bounded sensor reading alterationsAutomatica2018943544381095310.1016/j.automatica.2018.04.006 – reference: FritzRZhangPModeling and detection of cyber attacks on discrete event systemsIFAC-PapersOnLine201851728529010.1016/j.ifacol.2018.06.314 – reference: Mohajerani S, Meira-Góes R, Lafortune S (2020) Efficient synthesis of sensor deception attacks using observation Equivalence-Based abstraction. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 28–34 – reference: Li Y, Tong Y, Giua A (2020) Detection and prevention of cyber attacks in networked control systems. In: Proceedings of the 15th IFAC Workshop on Discrete Event Systems, pp 7–13 – reference: Cassandras C, Lafortune S (2007) Introduction to Discrete Event Systems, 2nd edn. Springer, New York – reference: Lin L, Zhu Y, Su R (2019) Towards bounded synthesis of resilient supervisors against actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 7659–7664 – reference: SuRWonhamWMSupervisor reduction for discrete-event systemsDiscret Event Dyn Syst2004143153203231110.1023/B:DISC.0000005009.40749.b6 – reference: Zhang Q, Seatzu C, Li Z, Giua A (2021) State estimation under attack in partially-observed discrete event systems. arXiv:https://arxiv.org/abs/1906.10207v3 – reference: WakaikiMTabuadaPHespanhaJPSupervisory control of discrete-event systems under attacksDyn Games Appl201994965983403194310.1007/s13235-018-0285-3 – reference: Meira-GóesRKangEKwongRHLafortuneSSynthesis of sensor deception attacks at the supervisory layer of Cyber–Physical systemsAutomatica2020121109172413352310.1016/j.automatica.2020.109172 – reference: CarvalhoLKWuYCKwongRLafortuneSDetection and mitigation of classes of attacks in supervisory control systemsAutomatica201897121133385745310.1016/j.automatica.2018.07.017 – reference: LimaPMAlvesMVSCarvalhoLKMoreiraMVSecurity against communication network attacks of cyber-physical systemsJ Control Autom Electr Syst201930112513510.1007/s40313-018-0420-9 – reference: Wang Y, Pajic M (2019) Supervisory control of discrete event systems in the presence of sensor and actuator attacks. In: Proceedings of the 58th IEEE Conference on Decision and Control. IEEE, pp 5350–5355 – reference: JiYYinXLafortuneSOpacity enforcement using nondeterministic publicly known edit functionsIEEE Trans Autom Control2019641043694376401709210.1109/TAC.2019.2897553 – reference: Lu Y (2017) Cyber physical system (CPS)-based industry 4.0: A Survey. J Ind Integr Manag 02(03):17500141–175001457 – reference: Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. 13th International Workshop on Discrete Event Systems, pp 298–305 – reference: Gao C, Seatzu C, Li Z, Giua A (2019) Multiple attacks detection on discrete event systems. IEEE International Conference on Systems, Man and Cybernetics, pp 2352–2357 – reference: WangWLafortuneSLinFAn algorithm for calculating indistinguishable states and clusters in Finite-State automata with partially observable transitionsSyst Control Lett2007569-10656661234465410.1016/j.sysconle.2007.03.006 – ident: 351_CR5 doi: 10.1109/SMC.2019.8914035 – volume: 14 start-page: 31 year: 2004 ident: 351_CR17 publication-title: Discret Event Dyn Syst doi: 10.1023/B:DISC.0000005009.40749.b6 – ident: 351_CR10 doi: 10.1109/CDC40024.2019.9030171 – ident: 351_CR14 doi: 10.1016/j.ifacol.2021.04.069 – volume: 56 start-page: 656 issue: 9-10 year: 2007 ident: 351_CR19 publication-title: Syst Control Lett doi: 10.1016/j.sysconle.2007.03.006 – volume: 30 start-page: 125 issue: 1 year: 2019 ident: 351_CR8 publication-title: J Control Autom Electr Syst doi: 10.1007/s40313-018-0420-9 – volume: 97 start-page: 121 year: 2018 ident: 351_CR2 publication-title: Automatica doi: 10.1016/j.automatica.2018.07.017 – volume: 64 start-page: 4369 issue: 10 year: 2019 ident: 351_CR6 publication-title: IEEE Trans Autom Control doi: 10.1109/TAC.2019.2897553 – volume: 121 start-page: 109172 year: 2020 ident: 351_CR12 publication-title: Automatica doi: 10.1016/j.automatica.2020.109172 – ident: 351_CR20 doi: 10.1109/CDC40024.2019.9029767 – ident: 351_CR7 doi: 10.1016/j.ifacol.2021.04.001 – volume: 51 start-page: 285 issue: 7 year: 2018 ident: 351_CR4 publication-title: IFAC-PapersOnLine doi: 10.1016/j.ifacol.2018.06.314 – ident: 351_CR15 doi: 10.23919/ECC.2019.8795849 – volume: 94 start-page: 35 year: 2018 ident: 351_CR16 publication-title: Automatica doi: 10.1016/j.automatica.2018.04.006 – ident: 351_CR22 – volume: 9 start-page: 965 issue: 4 year: 2019 ident: 351_CR18 publication-title: Dyn Games Appl doi: 10.1007/s13235-018-0285-3 – ident: 351_CR3 doi: 10.1007/978-0-387-68612-7 – ident: 351_CR11 doi: 10.1142/S2424862217500142 – ident: 351_CR9 doi: 10.1007/s10626-020-00312-2 – ident: 351_CR21 doi: 10.1109/ETFA.2018.8502501 – ident: 351_CR1 doi: 10.1109/WODES.2016.7497863 – volume: 9286 start-page: 1 issue: c year: 2021 ident: 351_CR13 publication-title: IEEE Trans Autom Control |
SSID | ssj0003905 |
Score | 2.34503 |
Snippet | This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 143 |
SubjectTerms | Algorithms Control Convex and Discrete Geometry Discrete event systems Electrical Engineering Machines Manufacturing Mathematics Mathematics and Statistics Operations Research/Decision Theory Processes Supervisory control Systems Theory Visual observation |
Title | Discrete-event systems subject to unknown sensor attacks |
URI | https://link.springer.com/article/10.1007/s10626-021-00351-3 https://www.proquest.com/docview/2639021830 |
Volume | 32 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED1Bu8CA-BSBUnlgA0uJnS-PFbRUoDJRqUxR7NgSEkpRk_5_zm7SFgRIjFEcDy9n3zv77h3AdZSLFN02o8qwhFqFOZryQqMt8zwQMpHS9QacPMfjafg4i2ZNUVjVZru3V5Jup94qdkPyTW1Kgbv-onwXupGN3dGKp2yw3n8xineJixhZ0BgNuimV-XmOr-5owzG_XYs6bzM6hIOGJpLB6r8ewY4uj2F_SzwQnyZrxdXqBNL7N9wAkAFTJ8lEVgrNFamW0p60kHpOlqU9QCtJhZHrfEHyurb19acwHQ1f7sa06YpAFS6XmgpENykiX2tj0APp1OdhrLUqjEiCAHH2jTAKiYxIZSTzNNDKaM2kCgU3hSr4GXTKeanPgQiMX5BA5TyWIkw0jo5cF9A8Z34imfEgaMHJVCMZbjtXvGcbsWMLaIaAZg7QjHtws_7mYyWY8efoXot51iyeKmPImhx18z24bf_D5vXvs138b_gl7DFbzOAyynrQqRdLfYUUo5Z96A4eXp-GfWdZn2x1xuI |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BGYAB8RSFAh7YwFJi5-WxAqoCbadW6mbFiS0hoRQ16f_n7CZtQYDEGMX28Plx39l33wHchqlI0GwzmhkWU6swRxOea1zLPPWFipVytQGHo6g_CV6m4bROCiubaPfmSdKd1BvJbki-qQ0pcM9flG_DDg6e2ECuCeuuzl_04l3gInoWNMIFXafK_DzGV3O05pjfnkWdtekdwkFNE0l3Oa9HsKWLY9jfEA_Er-FKcbU8geTxDQ8AZMDUSTKRpUJzScqFsjctpJqRRWEv0ApSouc6m5O0qmx-_SlMek_jhz6tqyLQDLdLRQWiG-ehp7UxaIF04vEg0jrLjYh9H3H2jDAZEhmRqFClia8zozVTWSC4ybOcn0GrmBX6HIhA_wUJVMojJYJYY-vQVQFNU-bFipk2-A04Mqslw23line5Fju2gEoEVDpAJW_D3arPx1Iw48_WnQZzWW-eUjJkTY66eW24b-Zh_fv30S7-1_wGdvvj4UAOnkevl7DHbGKDiy7rQKuaL_QV0o1KXbvV9Qmx9MhB |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFA46QfRBvOJ0ah5807A26S2PQx3zsuGDg72FJk1AkG6s3f_3JG23KSr4WJoG8uU0-U5yzncQug5TnsC2TYkyNCZWYY4kLNNgyyz1uYyldLUBh6NoMA6eJuFkLYvfRbs3V5JVToNVacrL7iwz3bXENyDixIYXuKswwjbRFizHvrXrMe0t12Lw6F0QI3gZJALjrtNmfu7j69a04pvfrkjdztPfR3s1ZcS9ao4P0IbOD9HumpAgPA2X6qvFEUru32ExADZMnDwTrtSaC1wspD11weUUL3J7mJbjArzY6RynZWlz7Y_RuP_wdjcgdYUEomCsJeGAdJyFntbGwPB14rEg0lplhse-D5h7hhsFpIYnMpRp4mtltKZSBZyZTGXsBLXyaa5PEebgywCZSlkkeRBraB26iqBpSr1YUtNGfgOOULV8uK1i8SFWwscWUAGACgeoYG10s_xmVoln_Nm602Au6h-pEBQYlKNxXhvdNvOwev17b2f_a36Ftl_v--LlcfR8jnaozXFwgWYd1CrnC30BzKOUl864PgGfWMx9 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Discrete-event+systems+subject+to+unknown+sensor+attacks&rft.jtitle=Discrete+event+dynamic+systems&rft.au=Alves%2C+Michel+R.+C.&rft.au=Pena%2C+Patr%C3%ADcia+N.&rft.au=Rudie%2C+Karen&rft.date=2022-03-01&rft.issn=0924-6703&rft.eissn=1573-7594&rft.volume=32&rft.issue=1&rft.spage=143&rft.epage=158&rft_id=info:doi/10.1007%2Fs10626-021-00351-3&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s10626_021_00351_3 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0924-6703&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0924-6703&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0924-6703&client=summon |