IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56
[43] N. Falliere, L. O. Murchu, and E. Chien, " W32. stuxnet dossier, v1. 4, " Symantec
[63] S. Hu, D. Yue, Q.-L. Han, X. Xie, X. Chen, and C. Dou, " Observer-based event-trig-
Corp., Mountain View, CA, Tech. Rep. MS10-046, 2011.
gered control for networked linear systems subject to denial-of-service attacks, " IEEE
[44] M. Zeller, " Myth or reality-Does the aurora vulnerability pose a risk to my gen-
Trans. Cybern., vol. 50, no. 5, pp. 1952-1964, 2019. doi: 10.1109/TCYB.2019.2903817.
erator? " in Proc. 2011 64th Annu. Conf. Protect. Relay Eng., pp. 130-136. doi: 10.1109/
[64] F. Li and Y. Tang, " False data injection attack for cyber-physical systems with
CPRE.2011.6035612.
resource constraint, " IEEE Trans. Cybern., vol. 50, no. 2, pp. 729-738, 2018. doi:
[45] D. Halperin et al., " Pacemakers and implantable cardiac defibrillators: Software
10.1109/TCYB.2018.2871951.
radio attacks and zero-power defenses, " in Proc. IEEE Symp. Security Privacy, 2008,
[65] D. Ye and T.-Y. Zhang, " Summation detector for false data-injection attack in
pp. 129-142. doi: 10.1109/SP.2008.31.
cyber-physical systems, " IEEE Trans. Cybern., vol. 50, no. 6, pp. 2338-2345, 2019. doi:
[46] K. Koscher et al., " Experimental security analysis of a modern automobile, " in
10.1109/TCYB.2019.2915124.
Proc. 2010 IEEE Symp. Security Privacy, pp. 447-462. doi: 10.1109/SP.2010.34.
[66] Y. Mo, R. Chabukswar, and B. Sinopoli, " Detecting integrity attacks on SCADA
[47] J. Li, Y. Liu, T. Chen, Z. Xiao, Z. Li, and J. Wang, " Adversarial attacks and defenses
systems, " IEEE Trans. Control Syst. Technol., vol. 22, no. 4, pp. 1396-1407, 2014. doi:
on cyber-physical systems: A survey, " IEEE Internet Things J., vol. 7, no. 6, pp. 5103-
10.1109/TCST.2013.2280899.
5115, 2020. doi: 10.1109/JIOT.2020.2975654.
[67] H. S. Sanchez, D. Rotondo, M. L. Vidal, and J. Quevedo, " Frequency-based detec-
[48] H. Jeon and Y. Eun, " A stealthy sensor attack for uncertain cyber-physical systems, "
tion of replay attacks: Application to a quadrotor UAV, " in Proc. 2019 8th Int. Conf.
IEEE Internet Things J., vol. 6, no. 4, pp. 6345-6352, 2019. doi: 10.1109/JIOT.2019.2905878.
Syst. Control (ICSC), pp. 289-294. doi: 10.1109/ICSC47195.2019.8950619.
[49] Y. Liu, P. Ning, and M. K. Reiter, " False data injection attacks against state estima-
[68] A. Hoehn and P. Zhang, " Detection of replay attacks in cyber-physical systems, " in
tion in electric power grids, " ACM Trans. Inform. System Security (TISSEC), vol. 14,
Proc. 2016 Amer. Control Conf. (ACC), pp. 290-295. doi: 10.1109/ACC.2016.7524930.
no. 1, p. 13, 2011. doi: 10.1145/1952982.1952995.
[69] S. Ntalampiras, " Detection of integrity attacks in cyber-physical critical infra-
[50] J. Radcliffe, " Hacking medical devices for fun and insulin: Breaking the human
structures using ensemble modeling, " IEEE Trans. Ind. Informat., vol. 11, no. 1,
SCADA system, " in presented at the Black Hat Conf., 2011.
pp. 104-111, 2014. doi: 10.1109/TII.2014.2367322.
[51] C. Li, A. Raghunathan, and N. K. Jha, " Hijacking an insulin pump: Security attacks
[70] B. Yang, L. Guo, F. Li, J. Ye, and W.-Z. Song, " Vulnerability assessments of elec-
and defenses for a diabetes therapy system, " in Proc. 2011 13th IEEE Int. Conf. e-Health
tric drive systems due to sensor data integrity attacks, " IEEE Trans. Ind. Informat.,
Netw. Appl. Serv. (Healthcom), pp. 150-156. doi: 10.1109/HEALTH.2011.6026732.
vol. 16, no. 5, 2019. doi: 10.1109/TII.2019.2948056.
[52] D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler, " Evaluation of
[71] G. Park, C. Lee, H. Shim, Y. Eun, and K. H. Johansson, " Stealthy adversaries
smart grid and civilian UAV vulnerability to GPS spoofing attacks, " in Proc. ION GNSS
against uncertain cyber-physical systems: Threat of robust zero-dynamics attack, "
Meeting, vol. 3, 2012, pp. 3591-3605.
IEEE Trans. Autom. Control, vol. 64, no. 12, pp. 4907-4919, 2019. doi: 10.1109/
[53] M. Long, C.-H. Wu, and J. Y. Hung, " Denial of service attacks on network-based
TAC.2019.2903429.
control systems: impact and mitigation, " IEEE Trans. Ind. Informat., vol. 1, no. 2,
[72] M. Taheri, K. Khorasani, I. Shames, and N. Meskin, " Mitigation and resiliency
pp. 85-96, 2005. doi: 10.1109/TII.2005.844422.
of multi-agent systems subject to malicious cyber attacks on communication links, "
[54] C. De Persis and P. Tesi, " Input-to-state stabilizing control under denial-of-ser-
in Proc. 2020 IEEE Conf. Control Technol. Appl. (CCTA), pp. 857-862. doi: 10.1109/
vice, " IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930-2944, 2015. doi: 10.1109/
CCTA41146.2020.9206392.
TAC.2015.2416924.
[73] Y. Ni, Z. Guo, Y. Mo, and L. Shi, " On the performance analysis of reset attack in
[55] Y. Mo and B. Sinopoli, " False data injection attacks in cyber physical systems, " in
cyber-physical systems, " IEEE Trans. Autom. Control, vol. 65, no. 1, pp. 419-425, 2019.
Proc. 1st Workshop Secure Control Syst., 2010, pp. 1-7.
doi: 10.1109/TAC.2019.2914655.
[56] Z.-H. Yu and W.-L. Chin, " Blind false data injection attack using PCA approxima-
[74] Y. Li, L. Shi, P. Cheng, J. Chen, and D. E. Quevedo, " Jamming attacks on
tion method in smart grid, " IEEE Trans. Smart Grid, vol. 6, no. 3, pp. 1219-1226, 2015.
remote state estimation in cyber-physical systems: A game-theoretic approach, "
doi: 10.1109/TSG.2014.2382714.
IEEE Trans. Autom. Control, vol. 60, no. 10, pp. 2831-2836, 2015. doi: 10.1109/
[57] G. Wu, G. Wang, J. Sun, and L. Xiong, " Optimal switching attacks and countermea-
TAC.2015.2461851.
sures in cyber-physical systems, " IEEE Trans. Syst., Man, Cybern., Syst., early access,
[75] R. S. Smith, " A decoupled feedback structure for covertly appropriating
2019. doi: 10.1109/TSMC.2019.2945067.
networked control systems, " IFAC Proc. Vol., vol. 44, no. 1, pp. 90-95, 2011. doi:
[58] S. Amin, X. Litrico, S. Sastry, and A. M. Bayen, " Cyber security of water SCADA sys-
10.3182/20110828-6-IT-1002.01721.
tems-Part I: Analysis and experimentation of stealthy deception attacks, " IEEE Trans.
[76] M. Zhu and S. Martinez, " On the performance analysis of resilient networked
Control Syst. Technol., vol. 21, no. 5, pp. 1963-1970, 2013. doi: 10.1109/TCST.2012.2211873.
control systems under replay attacks, " IEEE Trans. Autom. Control, vol. 59, no. 3,
[59] K. K. Gupta, B. Nath, and R. Kotagiri, " Layered approach using conditional ran-
pp. 804-808, 2014. doi: 10.1109/TAC.2013.2279896.
dom fields for intrusion detection, " IEEE Trans. Depend. Secure Comput., vol. 7, no. 1,
[77] F. Miao, M. Pajic, and G. J. Pappas, " Stochastic game approach for replay attack
pp. 35-49, 2010. doi: 10.1109/TDSC.2008.20.
detection, " in Proc. 2013 IEEE 52nd Annu. Conf. Decision Control (CDC), pp. 1854-
[60] S. Shahkar and K. Khorasani, " A resilient control against time-delay switch
1859. doi: 10.1109/CDC.2013.6760152.
and denial of service cyber attacks on load frequency control of distributed power
[78] I. Jovanov and M. Pajic, " Relaxing integrity requirements for attack-resilient
systems, " in Proc. 2020 IEEE Conf. Control Technol. Appl. (CCTA), pp. 718-725. doi:
cyber-physical systems, " IEEE Trans. Autom. Control, vol. 64, no. 12, pp. 4843-4858,
10.1109/CCTA41146.2020.9206282.
2019. doi: 10.1109/TAC.2019.2898510.
[61] H. Yuan, Y. Xia, and H. Yang, " Resilient state estimation of cyber-physical system
[79] S. Axelsson, " Intrusion detection systems: A survey and taxonomy, " Dept. Comput.
with multichannel transmission under dos attack, " IEEE Trans. Syst., Man, Cybern.,
Eng., Chalmers Univ., Tech. Rep., 2000. [Online]. Available: http://www.cs.unibo.it/
Syst., early access, 2020. doi: 10.1109/TSMC.2020.2964586.
~montreso/master/materiale/ids/ids-survey.pdf
[62] S. Lai, B. Chen, T. Li, and L. Yu, " Packet-based state feedback control under dos
[80] C. Lee, H. Shim, and Y. Eun, " On redundant observability: From security index to
attacks in cyber-physical systems, " IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 66,
attack detection and resilient state estimation, " IEEE Trans. Autom. Control, vol. 64,
no. 8, pp. 1421-1425, 2018. doi: 10.1109/TCSII.2018.2881984.
no. 2, pp. 775-782, 2018. doi: 10.1109/TAC.2018.2837107.
56
IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE Apri l 2021
http://www.cs.unibo.it/~montreso/master/materiale/ids/ids-survey.pdf
http://www.cs.unibo.it/~montreso/master/materiale/ids/ids-survey.pdf
IEEE Systems, Man and Cybernetics Magazine - April 2021
Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - April 2021
contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover1
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 4
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 5
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 6
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 7
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 8
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 9
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 10
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 11
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 12
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 13
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 14
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 15
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 16
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 17
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 18
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 19
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 20
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 21
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 22
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 23
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 24
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 25
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 26
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 27
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 28
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 29
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 30
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 31
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 32
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 33
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 34
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 35
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 36
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 37
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 38
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 39
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 40
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 41
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 42
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 43
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 44
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 45
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 46
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 47
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 48
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 49
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 50
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 51
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 52
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 53
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 54
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 55
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 57
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 58
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 59
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 60
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 61
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 62
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 63
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 64
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com