IEEE Systems, Man and Cybernetics Magazine - April 2021 - 55

[4] S. Sahoo, T. Dragicevic, and F. Blaabjerg, " Cyber security in control of grid-tied

[23] C. Kwon, W. Liu, and I. Hwang, " Security analysis for cyber-physical systems

power electronic converters-Challenges and vulnerabilities, " IEEE J. Emerg. Sel. Top-

against stealthy deception attacks, " in Proc. Amer. Control Conf. (ACC), 2013,

ics Power Electron., early access. doi: 10.1109/JESTPE.2019.2953480.

pp. 3344-3349. doi: 10.1109/ACC.2013.6580348.

[5] M. Keshk, E. Sitnikova, N. Moustafa, J. Hu, and I. Khalil, " An integrated

[24] E. K. Wang, Y. Ye, X. Xu, S.-M. Yiu, L. C. K. Hui, and K.-P. Chow, " Security issues

framework for privacy-preserving based anomaly detection for cyber-phys-

and challenges for cyber physical system, " in Proc. 2010 IEEE/ACM Int. Conf. Green

ical systems, " IEEE Trans. Sustain. Comput., early access. doi: 10.1109/

Comput. Commun. Int. Conf. Cyber, Phys. Soc. Comput., pp. 733-738. doi: 10.1109/

TSUSC.2019.2906657.

GreenCom-CPSCom.2010.36.

[6] E. Hallaji, R. Razavi-Far, and M. Saif, " Detection of malicious SCADA communica-

[25] B. Zhu, A. Joseph, and S. Sastry, " A taxonomy of cyber attacks on SCADA sys-

tions via multi-subspace feature selection, " in Proc. 2020 Int. Joint Conf. Neural Netw.

tems, " in Proc. 2011 Int. Conf. Internet of Things, 4th Int. Conf. Cyber, Phys. Soc.

(IJCNN), pp. 1-8. doi: 10.1109/IJCNN48605.2020.9207066.

Comput., pp. 380-388. doi: 10.1109/iThings/CPSCom.2011.34.

[7] G. Bernieri, E. E. Miciolino, F. Pascucci, and R. Setola, " Monitoring system reaction

[26] A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry, " Cyber secu-

in cyber-physical testbed under cyber-attacks, " Comput. Elect. Eng., vol. 59, pp. 203-

rity analysis of state estimators in electric power systems, " in Proc. 2010 49th IEEE

209, Apr. 2017. doi: 10.1016/j.compeleceng.2017.02.010.

Conf. Decision Control (CDC), pp. 5991-5998. doi: 10.1109/CDC.2010.5717318.

[8] L. Yang, X. Cao, and J. Li, " A new cyber security risk evaluation method for oil and

[27] D. L. Lough, " A taxonomy of computer attacks with applications to wireless

gas SCADA based on factor state space, " Chaos, Solitons Fractals, vol. 89, pp. 203-209,

networks, " Ph.D. dissertation, Comput. Eng., Virginia Polytech. Inst. State Univ., Blacks-

Aug. 2016. doi: 10.1016/j.chaos.2015.10.030.

burg, 2001.

[9] S. Liu, G. Wei, Y. Song, and Y. Liu, " Extended Kalman filtering for stochastic non-

[28] S. Hansman and R. Hunt, " A taxonomy of network and computer attacks, " Com-

linear systems with randomly occurring cyber attacks, " Neurocomputing, vol. 207,

put. Security, vol. 24, no. 1, pp. 31-43, 2005. doi: 10.1016/j.cose.2004.06.011.

pp. 708-716, Sept. 2016. doi: 10.1016/j.neucom.2016.05.060.

[29] D. Ding, Q.-L. Han, Z. Wang, and X. Ge, " A survey on model-based distributed con-

[10] W. Granzer, F. Praus, and W. Kastner, " Security in building automation sys-

trol and filtering for industrial cyber-physical systems, " IEEE Trans. Ind. Informat.,

tems, " IEEE Trans. Ind. Electron., vol. 57, no. 11, pp. 3622-3630, 2010. doi: 10.1109/

vol. 15, no. 5, pp. 2483-2499, 2019. doi: 10.1109/TII.2019.2905295.

TIE.2009.2036033.

[30] A. A. Cardenas, S. Amin, and S. Sastry, " Secure control: Towards survivable cyber-

[11] A. A. Cardenas, S. Amin, and S. Sastry, " Research challenges for the security of

physical systems, " in Proc. 28th Int. Conf. Distrib. Comput. Syst. Workshops, 2008,

control systems. " in HOTSEC'08: Proc. 3rd Conf. Hot Topics Security, 2008, pp. 1-6.

pp. 495-500. doi: 10.1109/ICDCS.Workshops.2008.40.

doi: 10.5555/1496671.1496677.

[31] H. Rezaee and F. Abdollahi, " Secure consensus control of multiagent cyber-

[12] " Critical infrastructure protection in North American electric reliability corpora-

physical systems with uncertain nonlinear models, " IEEE Syst. J., vol. 14, no. 3,

tion. " NERC-CIP. 2008.

pp. 3539-3546, 2019. doi: 10.1109/JSYST.2019.2959408.

[13] F. Cleveland, " IEC TC57 security standards for the power system's information

[32] H. L. Gawand, A. Bhattacharjee, and K. Roy, " Securing a cyber physical system

infrastructure-Beyond simple encryption, " in Proc. 2005/2006 IEEE/PES Transm.

in nuclear power plants using least square approximation and computational geo-

Distrib. Conf. Exhibit., pp. 1079-1087. doi: 10.1109/TDC.2006.1668652.

metric approach, " Nucl. Eng. Technol., vol. 49, no. 3, pp. 484-494, 2017. doi: 10.1016/

[14] K. Stouffer, J. Falco, and K. Kent, " Guide to supervisory control and data acquisi-

j.net.2016.10.009.

tion (scada) and industrial control system security, " NIST, Gaithersburg, MD, NIST

[33] R. Tan, G. Xing, B. Liu, J. Wang, and X. Jia, " Exploiting data fusion to improve

Special Publication SP800-82 (draft), 2006.

the coverage of wireless sensor networks, " IEEE-ACM Trans. Netw., vol. 20, no. 2,

[15] A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, " Challenges

pp. 450-462, 2012. doi: 10.1109/TNET.2011.2164620.

for securing cyber physical systems, " in Proc. Workshop Future Directions Cyber-Phys.

[34] C. Zhu, L. Shu, T. Hara, L. Wang, S. Nishio, and L. T. Yang, " A survey on communi-

Syst. Security, vol. 5, 2009, pp. 1-7.

cation and data management issues in mobile sensor networks, " Wireless Commun.

[16] L. Teo, Y. Zheng, and G.-J. Ahni, " Intrusion detection force: An infrastructure for

Mobile Comput., vol. 14, no. 1, pp. 19-36, 2014. doi: 10.1002/wcm.1219.

internet-scale intrusion detection, " in Proc. 1st IEEE Int. Workshop Inf. Assurance,

[35] R. Shirey. " Internet security glossary, " IETF. 2000. https://tools.ietf.org/html/

2003, pp. 73-86. doi: 10.1109/IWIAS.2003.1192460.

rfc2828

[17] D. Powner and K. Rhodes. " Critical infrastructure protection: Multiple efforts to

[36] M. A. Bishop, Computer Security: Art and Science. Reading, MA: Addison-Wesley, 2003.

secure control systems are under way, but challenges remain. " GAO. 2007. https://www

[37] A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Principles. Hobo-

.gao.gov/products/GAO-07-1036

ken, NJ: Wiley, 2006.

[18] J. P. Farwell and R. Rohozinski, " Stuxnet and the future of cyber war, " Survival,

[38] K. Poulsen. " Ex-employee fingered in Texas power company hack, " Wired. 2009.

vol. 53, no. 1, pp. 23-40, 2011. doi: 10.1080/00396338.2011.555586.

https://www.wired.com/2009/05/efh/#:~:text=The%20FBI%20is%20investigating%20

[19] X. Cao, C. Wei, J. Li, L. Yang, D. Zhang, and G. Tang, " The geological disasters

a,March%2C%20costing%20it%20over%20%2426%2C000

defense expert system of the massive pipeline network SCADA system based on FNN, "

[39] D. Kravets, " Feds: Hacker disabled offshore oil platform leak-detection system, "

in Proc. APWeb 2012: Web Technol. Appl., 2012, pp. 19-26. doi: 10.1007/978-3-642

Wired. 2009. https://www.wired.com/2009/03/feds-hacker-dis/

-29426-6_4.

[40] A. Baniamerian, K. Khorasani, and N. Meskin, " Determination of security

[20] R. M. Lee, M. J. Assante, and T. Conway. " Analysis of the cyber attack on the Ukrai-

index for linear cyber-physical systems subject to malicious cyber attacks, " in

nian power grid. " SANS Industrial Control Systems. 2016.

Proc. 2019 IEEE 58th Conf. Decision Control (CDC), pp. 4507-4513. doi: 10.1109/

[21] Y. Mo and B. Sinopoli, " On the performance degradation of cyber-physical systems

CDC40024.2019.9029298.

under stealthy integrity attacks, " IEEE Trans. Autom. Control, vol. 61, no. 9, pp. 2618-

[41] J. Slay and M. Miller, " Lessons learned from the Maroochy water breach, " in Proc.

2624, 2016. doi: 10.1109/TAC.2015.2498708.

Conf. Crit. Infrastruct. Protection, 2007, pp. 73-82. doi: 10.1007/978-0-387-75462-8_6.

[22] D. Van Long, L. Fillatre, and I. Nikiforov, " Sequential monitoring of SCADA sys-

[42] A. Hahn, R. K. Thomas, I. Lozano, and A. Cardenas, " A multi-layered and kill-

tems against cyber/physical attacks, " IFAC-PapersOnLine, vol. 48, no. 21, pp. 746-753,

chain based security analysis framework for cyber-physical systems, " Int. J. Crit. Infra-

2015. doi: 10.1016/j.ifacol.2015.09.616.

struct. Protect., vol. 11, pp. 39-50, 2015. doi: 10.1016/j.ijcip.2015.08.003.

	

Ap ri l 2021

IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE	

55


https://tools.ietf.org/html/rfc2828 https://tools.ietf.org/html/rfc2828 http://www.gao.gov/products/GAO-07-1036 http://www.gao.gov/products/GAO-07-1036 https://www.wired.com/2009/05/efh/#:~:text=The%20FBI%20ishttps://www.wired.com/2009/05/efh/#:~:text=TheFBI%20isinvestigatinga,March%2Ccostingitover%2426%2C000%20investigating%20 https://www.wired.com/2009/05/efh/#:~:text=The%20FBI%20ishttps://www.wired.com/2009/05/efh/#:~:text=TheFBI%20isinvestigatinga,March%2Ccostingitover%2426%2C000%20investigating%20 https://www.wired.com/2009/03/feds-hacker-dis/

IEEE Systems, Man and Cybernetics Magazine - April 2021

Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - April 2021

contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover1
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 4
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 5
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 6
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 7
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 8
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 9
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 10
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 11
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 12
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 13
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 14
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 15
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 16
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 17
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 18
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 19
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 20
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 21
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 22
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 23
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 24
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 25
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 26
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 27
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 28
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 29
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 30
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 31
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 32
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 33
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 34
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 35
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 36
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 37
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 38
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 39
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 40
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 41
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 42
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 43
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 44
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 45
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 46
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 47
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 48
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 49
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 50
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 51
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 52
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 53
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 54
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 55
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 57
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 58
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 59
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 60
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 61
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 62
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 63
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 64
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com