IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56

[43] N. Falliere, L. O. Murchu, and E. Chien, " W32. stuxnet dossier, v1. 4, " Symantec

[63] S. Hu, D. Yue, Q.-L. Han, X. Xie, X. Chen, and C. Dou, " Observer-based event-trig-

Corp., Mountain View, CA, Tech. Rep. MS10-046, 2011.

gered control for networked linear systems subject to denial-of-service attacks, " IEEE

[44] M. Zeller, " Myth or reality-Does the aurora vulnerability pose a risk to my gen-

Trans. Cybern., vol. 50, no. 5, pp. 1952-1964, 2019. doi: 10.1109/TCYB.2019.2903817.

erator? " in Proc. 2011 64th Annu. Conf. Protect. Relay Eng., pp. 130-136. doi: 10.1109/

[64] F. Li and Y. Tang, " False data injection attack for cyber-physical systems with

CPRE.2011.6035612.

resource constraint, " IEEE Trans. Cybern., vol. 50, no. 2, pp. 729-738, 2018. doi:

[45] D. Halperin et al., " Pacemakers and implantable cardiac defibrillators: Software

10.1109/TCYB.2018.2871951.

radio attacks and zero-power defenses, " in Proc. IEEE Symp. Security Privacy, 2008,

[65] D. Ye and T.-Y. Zhang, " Summation detector for false data-injection attack in

pp. 129-142. doi: 10.1109/SP.2008.31.

cyber-physical systems, " IEEE Trans. Cybern., vol. 50, no. 6, pp. 2338-2345, 2019. doi:

[46] K. Koscher et al., " Experimental security analysis of a modern automobile, " in

10.1109/TCYB.2019.2915124.

Proc. 2010 IEEE Symp. Security Privacy, pp. 447-462. doi: 10.1109/SP.2010.34.

[66] Y. Mo, R. Chabukswar, and B. Sinopoli, " Detecting integrity attacks on SCADA

[47] J. Li, Y. Liu, T. Chen, Z. Xiao, Z. Li, and J. Wang, " Adversarial attacks and defenses

systems, " IEEE Trans. Control Syst. Technol., vol. 22, no. 4, pp. 1396-1407, 2014. doi:

on cyber-physical systems: A survey, " IEEE Internet Things J., vol. 7, no. 6, pp. 5103-

10.1109/TCST.2013.2280899.

5115, 2020. doi: 10.1109/JIOT.2020.2975654.

[67] H. S. Sanchez, D. Rotondo, M. L. Vidal, and J. Quevedo, " Frequency-based detec-

[48] H. Jeon and Y. Eun, " A stealthy sensor attack for uncertain cyber-physical systems, "

tion of replay attacks: Application to a quadrotor UAV, " in Proc. 2019 8th Int. Conf.

IEEE Internet Things J., vol. 6, no. 4, pp. 6345-6352, 2019. doi: 10.1109/JIOT.2019.2905878.

Syst. Control (ICSC), pp. 289-294. doi: 10.1109/ICSC47195.2019.8950619.

[49] Y. Liu, P. Ning, and M. K. Reiter, " False data injection attacks against state estima-

[68] A. Hoehn and P. Zhang, " Detection of replay attacks in cyber-physical systems, " in

tion in electric power grids, " ACM Trans. Inform. System Security (TISSEC), vol. 14,

Proc. 2016 Amer. Control Conf. (ACC), pp. 290-295. doi: 10.1109/ACC.2016.7524930.

no. 1, p. 13, 2011. doi: 10.1145/1952982.1952995.

[69] S. Ntalampiras, " Detection of integrity attacks in cyber-physical critical infra-

[50] J. Radcliffe, " Hacking medical devices for fun and insulin: Breaking the human

structures using ensemble modeling, " IEEE Trans. Ind. Informat., vol. 11, no. 1,

SCADA system, " in presented at the Black Hat Conf., 2011.

pp. 104-111, 2014. doi: 10.1109/TII.2014.2367322.

[51] C. Li, A. Raghunathan, and N. K. Jha, " Hijacking an insulin pump: Security attacks

[70] B. Yang, L. Guo, F. Li, J. Ye, and W.-Z. Song, " Vulnerability assessments of elec-

and defenses for a diabetes therapy system, " in Proc. 2011 13th IEEE Int. Conf. e-Health

tric drive systems due to sensor data integrity attacks, " IEEE Trans. Ind. Informat.,

Netw. Appl. Serv. (Healthcom), pp. 150-156. doi: 10.1109/HEALTH.2011.6026732.

vol. 16, no. 5, 2019. doi: 10.1109/TII.2019.2948056.

[52] D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler, " Evaluation of

[71] G. Park, C. Lee, H. Shim, Y. Eun, and K. H. Johansson, " Stealthy adversaries

smart grid and civilian UAV vulnerability to GPS spoofing attacks, " in Proc. ION GNSS

against uncertain cyber-physical systems: Threat of robust zero-dynamics attack, "

Meeting, vol. 3, 2012, pp. 3591-3605.

IEEE Trans. Autom. Control, vol. 64, no. 12, pp. 4907-4919, 2019. doi: 10.1109/

[53] M. Long, C.-H. Wu, and J. Y. Hung, " Denial of service attacks on network-based

TAC.2019.2903429.

control systems: impact and mitigation, " IEEE Trans. Ind. Informat., vol. 1, no. 2,

[72] M. Taheri, K. Khorasani, I. Shames, and N. Meskin, " Mitigation and resiliency

pp. 85-96, 2005. doi: 10.1109/TII.2005.844422.

of multi-agent systems subject to malicious cyber attacks on communication links, "

[54] C. De Persis and P. Tesi, " Input-to-state stabilizing control under denial-of-ser-

in Proc. 2020 IEEE Conf. Control Technol. Appl. (CCTA), pp. 857-862. doi: 10.1109/

vice, " IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 2930-2944, 2015. doi: 10.1109/

CCTA41146.2020.9206392.

TAC.2015.2416924.

[73] Y. Ni, Z. Guo, Y. Mo, and L. Shi, " On the performance analysis of reset attack in

[55] Y. Mo and B. Sinopoli, " False data injection attacks in cyber physical systems, " in

cyber-physical systems, " IEEE Trans. Autom. Control, vol. 65, no. 1, pp. 419-425, 2019.

Proc. 1st Workshop Secure Control Syst., 2010, pp. 1-7.

doi: 10.1109/TAC.2019.2914655.

[56] Z.-H. Yu and W.-L. Chin, " Blind false data injection attack using PCA approxima-

[74] Y. Li, L. Shi, P. Cheng, J. Chen, and D. E. Quevedo, " Jamming attacks on

tion method in smart grid, " IEEE Trans. Smart Grid, vol. 6, no. 3, pp. 1219-1226, 2015.

remote state estimation in cyber-physical systems: A game-theoretic approach, "

doi: 10.1109/TSG.2014.2382714.

IEEE Trans. Autom. Control, vol. 60, no. 10, pp. 2831-2836, 2015. doi: 10.1109/

[57] G. Wu, G. Wang, J. Sun, and L. Xiong, " Optimal switching attacks and countermea-

TAC.2015.2461851.

sures in cyber-physical systems, " IEEE Trans. Syst., Man, Cybern., Syst., early access,

[75] R. S. Smith, " A decoupled feedback structure for covertly appropriating

2019. doi: 10.1109/TSMC.2019.2945067.

networked control systems, " IFAC Proc. Vol., vol. 44, no. 1, pp. 90-95, 2011. doi:

[58] S. Amin, X. Litrico, S. Sastry, and A. M. Bayen, " Cyber security of water SCADA sys-

10.3182/20110828-6-IT-1002.01721.

tems-Part I: Analysis and experimentation of stealthy deception attacks, " IEEE Trans.

[76] M. Zhu and S. Martinez, " On the performance analysis of resilient networked

Control Syst. Technol., vol. 21, no. 5, pp. 1963-1970, 2013. doi: 10.1109/TCST.2012.2211873.

control systems under replay attacks, " IEEE Trans. Autom. Control, vol. 59, no. 3,

[59] K. K. Gupta, B. Nath, and R. Kotagiri, " Layered approach using conditional ran-

pp. 804-808, 2014. doi: 10.1109/TAC.2013.2279896.

dom fields for intrusion detection, " IEEE Trans. Depend. Secure Comput., vol. 7, no. 1,

[77] F. Miao, M. Pajic, and G. J. Pappas, " Stochastic game approach for replay attack

pp. 35-49, 2010. doi: 10.1109/TDSC.2008.20.

detection, " in Proc. 2013 IEEE 52nd Annu. Conf. Decision Control (CDC), pp. 1854-

[60] S. Shahkar and K. Khorasani, " A resilient control against time-delay switch

1859. doi: 10.1109/CDC.2013.6760152.

and denial of service cyber attacks on load frequency control of distributed power

[78] I. Jovanov and M. Pajic, " Relaxing integrity requirements for attack-resilient

systems, " in Proc. 2020 IEEE Conf. Control Technol. Appl. (CCTA), pp. 718-725. doi:

cyber-physical systems, " IEEE Trans. Autom. Control, vol. 64, no. 12, pp. 4843-4858,

10.1109/CCTA41146.2020.9206282.

2019. doi: 10.1109/TAC.2019.2898510.

[61] H. Yuan, Y. Xia, and H. Yang, " Resilient state estimation of cyber-physical system

[79] S. Axelsson, " Intrusion detection systems: A survey and taxonomy, " Dept. Comput.

with multichannel transmission under dos attack, " IEEE Trans. Syst., Man, Cybern.,

Eng., Chalmers Univ., Tech. Rep., 2000. [Online]. Available: http://www.cs.unibo.it/

Syst., early access, 2020. doi: 10.1109/TSMC.2020.2964586.

~montreso/master/materiale/ids/ids-survey.pdf

[62] S. Lai, B. Chen, T. Li, and L. Yu, " Packet-based state feedback control under dos

[80] C. Lee, H. Shim, and Y. Eun, " On redundant observability: From security index to

attacks in cyber-physical systems, " IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 66,

attack detection and resilient state estimation, " IEEE Trans. Autom. Control, vol. 64,

no. 8, pp. 1421-1425, 2018. doi: 10.1109/TCSII.2018.2881984.

no. 2, pp. 775-782, 2018. doi: 10.1109/TAC.2018.2837107.

56	

IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE Apri l 2021


http://www.cs.unibo.it/~montreso/master/materiale/ids/ids-survey.pdf http://www.cs.unibo.it/~montreso/master/materiale/ids/ids-survey.pdf

IEEE Systems, Man and Cybernetics Magazine - April 2021

Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - April 2021

contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover1
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 4
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 5
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 6
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 7
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 8
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 9
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 10
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 11
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 12
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 13
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 14
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 15
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 16
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 17
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 18
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 19
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 20
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 21
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 22
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 23
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 24
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 25
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 26
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 27
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 28
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 29
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 30
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 31
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 32
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 33
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 34
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 35
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 36
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 37
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 38
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 39
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 40
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 41
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 42
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 43
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 44
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 45
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 46
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 47
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 48
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 49
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 50
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 51
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 52
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 53
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 54
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 55
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 57
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 58
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 59
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 60
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 61
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 62
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 63
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 64
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com