IEEE Systems, Man and Cybernetics Magazine - April 2021 - 60

[194] A. Mustafa, B. Poudel, A. Bidram, and H. Modares, " Detection and mitigation of

[213] J. Petit and S. E. Shladover, " Potential cyberattacks on automated vehicles, " IEEE

data manipulation attacks in AC microgrids, " IEEE Trans. Smart Grid, vol. 11, no. 3,

Trans. Intell. Transp. Syst., vol. 16, no. 2, pp. 546-556, 2014. doi: 10.1109/TITS.2014.2342271.

pp. 2588-2603, 2019. doi: 10.1109/TSG.2019.2958014.

[214] A. Bezemskij, G. Loukas, D. Gan, and R. J. Anthony, " Detecting cyber-physical

[195] M. Chlela, D. Mascarella, G. Joós, and M. Kassouf, " Fallback control for isochronous

threats in an autonomous robotic vehicle using Bayesian networks, " in Proc. 2017

energy storage systems in autonomous microgrids under denial-of-service cyber-attacks, "

IEEE Int. Conf. Internet of Things (iThings) IEEE Green Comput. Commun. (Gre-

IEEE Trans. Smart Grid, vol. 9, no. 5, pp. 4702-4711, 2017. doi: 10.1109/TSG.2017.2667586.

enCom) IEEE Cyber, Phys. Soc. Comput. (CPSCom) IEEE Smart Data (SmartData),

[196] S. Zuo, O. A. Beg, F. L. Lewis, and A. Davoudi, " Resilient networked AC

pp. 98-103. doi: 10.1109/iThings-GreenCom-CPSCom-SmartData.2017.20.

microgrids under unbounded cyber attacks, " IEEE Trans. Smart Grid, vol. 11, no. 5,

[215] N. Bezzo, J. Weimer, M. Pajic, O. Sokolsky, G. J. Pappas, and I. Lee, " Attack resilient

pp. 3785-3794, 2020. doi: 10.1109/TSG.2020.2984266.

state estimation for autonomous robotic systems, " in Proc. 2014 IEEE/RSJ Int. Conf.

[197] B. Zhang, C. Dou, D. Yue, and Z. Zhang, " Response hierarchical control strategy of

Intell. Robots Syst. (IROS 2014), pp. 3692-3698. doi: 10.1109/IROS.2014.6943080.

communication data disturbance in micro-grid under the concept of cyber physical sys-

[216] M. Kordestani, A. Chibakhsh, and M. Saif, " A control oriented cyber-secure strat-

tem, " IET Gener., Transm. Distrib., vol. 12, no. 21, pp. 5867-5878, 2018. doi: 10.1049/

egy based on multiple sensor fusion, " in Proc. 2019 IEEE Int. Conf. Syst., Man Cybern.

iet-gtd.2018.5356.

(SMC), pp. 1875-1881. doi: 10.1109/SMC.2019.8914241.

[198] U. Attorney, " Willows man arrested for hacking into Tehama Colusa canal authority

[217] Y. Chen, S. Kar, and J. M. Moura, " Cyber-physical attacks with control objectives, " IEEE

computer system, " 2007.

Trans. Autom. Control, vol. 63, no. 5, pp. 1418-1425, 2017. doi: 10.1109/TAC.2017.2741778.

[199] R. Esposito. " Hackers penetrate water system computers. " ABC News. 2006.

[218] M. Zhu and S. Martinez, " Attack-resilient distributed formation control via

[200] S. Amin, X. Litrico, S. S. Sastry, and A. M. Bayen, " Cyber security of water

online adaptation, " in Proc. 2011 50th IEEE Conf. Decision Control Euro. Control

SCADA systems-Part II: Attack detection using enhanced hydrodynamic models, "

Conf. (CDC-ECC), pp. 6624-6629. doi: 10.1109/CDC.2011.6161327.

IEEE Trans. Control Syst. Technol., vol. 21, no. 5, pp. 1679-1693, 2013. doi: 10.1109/

[219] Z. Zhao, Y. Huang, Z. Zhen, and Y. Li, " Data-driven false data-injection attack

TCST.2012.2211874.

design and detection in cyber-physical systems, " IEEE Trans. Cybern., early access,

[201] N. Bakalos et al., " Protecting water infrastructure from cyber and physical

2020. doi: 10.1109/TCYB.2020.2969320.

threats: Using multimodal data fusion and adaptive deep learning to monitor critical

[220] F. van Wyk, Y. Wang, A. Khojandi, and N. Masoud, " Real-time sensor anomaly

systems, " IEEE Signal Process. Mag., vol. 36, no. 2, pp. 36-48, 2019. doi: 10.1109/

detection and identification in automated vehicles, " IEEE Trans. Intell. Transp. Syst.,

MSP.2018.2885359.

vol. 21, no. 3, pp. 1264-1276, 2019. doi: 10.1109/TITS.2019.2906038.

[202] L. F. C'ombita, A. A. Cardenas, and N. Quijano, " Mitigating sensor attacks against

[221] A. Petrillo, A. Pescape, and S. Santini, " A secure adaptive control for coop-

industrial control systems, " IEEE Access, vol. 7, pp. 92,444-92,455, July 9, 2019. doi:

erative driving of autonomous connected vehicles in the presence of heterogeneous

10.1109/ACCESS.2019.2927484.

-communication delays and cyberattacks, " IEEE Trans. Cybern., early access, 2020. doi:

[203] K. Paridari et al., " Cyber-physical-security framework for building energy man-

10.1109/TCYB.2019.2962601.

agement system, " in Proc. 2016 ACM/IEEE 7th Int. Conf. Cyber-Phys. Syst. (ICCPS),

[222] A. Ferdowsi, S. Ali, W. Saad, and N. B. Mandayam, " Cyber-physical security and safety of

pp. 1-9. doi: 10.1109/ICCPS.2016.7479072.

autonomous connected vehicles: optimal control meets multi-armed bandit learning, " IEEE

[204] G. T. Toussaint, " A simple linear algorithm for intersecting convex polygons, " Vis.

Trans. Commun., vol. 67, no. 10, pp. 7228-7244, 2019. doi: 10.1109/TCOMM.2019.2927570.

Comput., vol. 1, no. 2, pp. 118-123, 1985. doi: 10.1007/BF01898355.

[223] A. Greenberg. " Hackers remotely kill a jeep on the highway-With me in it. "

[205] M. Kordestani, A. Chaibakhsh, and M. Saif, " SMS-A security management

Wired. 2015. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

system for steam turbines using a multisensor array, " IEEE Syst. J., vol. 14, no. 3,

[224] H. Qiu, M. Qiu, G. Memmi, and M. Liu, " Secure health data sharing for medi-

pp. 3813-3824, 2020. doi: 10.1109/JSYST.2019.2960149.

cal cyber-physical systems for the healthcare 4.0, " IEEE J. Biomed. Health Inform.,

[206] H. M. Khalid, S. Muyeen, and J. C.-H. Peng, " Cyber-attacks in a looped energy-

vol. 24, no. 9, pp. 2499-2505, 2020. doi: 10.1109/JBHI.2020.2973467.

water nexus: An inoculated sub-observer-based approach, " IEEE Syst. J., vol. 14, no. 2,

[225] A. Razaque et al., " Survey: Cybersecurity vulnerabilities, attacks and solutions

pp. 2054-2065, 2019. doi: 10.1109/JSYST.2019.2941759.

in the medical domain, " IEEE Access, vol. 7, pp. 168,774-168,797, Oct. 31, 2019. doi:

[207] J. Yang, C. Zhou, Y.-C. Tian, and C. An, " A zoning-based secure control approach

10.1109/ACCESS.2019.2950849.

against actuator attacks in industrial cyber-physical systems, " IEEE Trans. Ind. Elec-

[226] A. Ray and R. Cleaveland, " Security assurance cases for medical cyber-physical

tron., vol. 68, no. 3, pp. 2637-2647, 2020. doi: 10.1109/TIE.2020.2972466.

systems, " IEEE Des. Test., vol. 32, no. 5, pp. 56-65, 2015. doi: 10.1109/MDAT.2015.2468222.

[208] L. An and G.-H. Yang, " State estimation under sparse sensor attacks: A con-

[227] B. H. Schell, M. V. Martin, P. C. Hung, and L. Rueda, " Cyber child pornography: A review

strained set partitioning approach, " IEEE Trans. Autom. Control, vol. 64, no. 9,

paper of the social and legal issues and remedies-and a proposed technological solu-

pp. 3861-3868, 2018. doi: 10.1109/TAC.2018.2885063.

tion, " Aggress. Violent Behav., vol. 12, no. 1, pp. 45-63, 2007. doi: 10.1016/j.avb.2006.03.003.

[209] H. Rezaee and F. Abdollahi, " Resilient attitude alignment in multispacecraft

[228] H. Alemzadeh, D. Chen, X. Li, T. Kesavadas, Z. T. Kalbarczyk, and R. K. Iyer,

systems, " IEEE Trans. Aerosp. Electron. Syst., vol. 55, no. 6, pp. 3651-3657, 2019. doi:

" Targeted attacks on teleoperated surgical robots: Dynamic model-based detection and

10.1109/TAES.2019.2895586.

mitigation, " in Proc. 2016 46th Annu. IEEE/IFIP Int. Conf. Depend. Syst. Netw. (DSN),

[210] A.-Y. Lu and G.-H. Yang, " Input-to-state stabilizing control for cyber-physical

pp. 395-406. doi: 10.1109/DSN.2016.43.

systems with multiple transmission channels under denial of service, " IEEE Trans.

[229] I. You, K. Yim, V. Sharma, G. Choudhary, R. Chen, and J.-H. Cho, " Misbehavior

Autom. Control, vol. 63, no. 6, pp. 1813-1820, 2017. doi: 10.1109/TAC.2017.2751999.

detection of embedded IoT devices in medical cyber physical systems, " in Proc.

[211] M. Kordestani, M. Dehghani, B. Moshiri, and M. Saif, " A new fusion estimation

2018 IEEE/ACM Int. Conf. Connected Health: Appl., Syst. Eng. Technol. (CHASE),

method for multi-rate multi-sensor systems with missing measurements, " IEEE Access,

pp. 88-93. doi: 10.1145/3278576.3278601.

vol. 8, pp. 47,522-47,532, Mar. 9, 2020. doi: 10.1109/ACCESS.2020.2979222.

[230] S. S. Ali, M. Ibrahim, O. Sinanoglu, K. Chakrabarty, and R. Karri, " Security

[212] M. M. Rana, " IoT-based electric vehicle state estimation and control algorithms

assessment of cyberphysical digital microfluidic biochips, " IEEE/ACM Trans. Comput.

under cyber attacks, " IEEE Internet Things J., vol. 7, no. 2, pp. 874-881, 2019. doi:

Biol. Bioinf., vol. 13, no. 3, pp. 445-458, 2015. doi: 10.1109/TCBB.2015.2509991.

10.1109/JIOT.2019.2946093.



60	

IEEE SYSTEMS, MAN, & CYBERNETICS MAGAZINE Apri l 2021


https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

IEEE Systems, Man and Cybernetics Magazine - April 2021

Table of Contents for the Digital Edition of IEEE Systems, Man and Cybernetics Magazine - April 2021

contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover1
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - contents
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 2
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 4
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 5
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 6
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 7
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 8
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 9
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 10
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 11
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 12
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 13
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 14
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 15
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 16
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 17
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 18
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 19
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 20
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 21
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 22
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 23
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 24
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 25
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 26
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 27
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 28
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 29
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 30
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 31
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 32
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 33
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 34
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 35
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 36
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 37
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 38
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 39
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 40
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 41
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 42
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 43
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 44
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 45
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 46
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 47
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 48
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 49
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 50
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 51
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 52
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 53
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 54
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 55
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 56
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 57
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 58
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 59
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 60
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 61
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 62
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 63
IEEE Systems, Man and Cybernetics Magazine - April 2021 - 64
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover3
IEEE Systems, Man and Cybernetics Magazine - April 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/smc_202301
https://www.nxtbook.com/nxtbooks/ieee/smc_202210
https://www.nxtbook.com/nxtbooks/ieee/smc_202207
https://www.nxtbook.com/nxtbooks/ieee/smc_202204
https://www.nxtbook.com/nxtbooks/ieee/smc_202201
https://www.nxtbook.com/nxtbooks/ieee/smc_202110
https://www.nxtbook.com/nxtbooks/ieee/smc_202107
https://www.nxtbook.com/nxtbooks/ieee/smc_202104
https://www.nxtbook.com/nxtbooks/ieee/smc_202101
https://www.nxtbook.com/nxtbooks/ieee/smc_202010
https://www.nxtbook.com/nxtbooks/ieee/smc_202007
https://www.nxtbook.com/nxtbooks/ieee/smc_202004
https://www.nxtbook.com/nxtbooks/ieee/smc_202001
https://www.nxtbook.com/nxtbooks/ieee/smc_201910
https://www.nxtbook.com/nxtbooks/ieee/smc_201907
https://www.nxtbook.com/nxtbooks/ieee/smc_201904
https://www.nxtbook.com/nxtbooks/ieee/smc_201901
https://www.nxtbook.com/nxtbooks/ieee/smc_201810
https://www.nxtbook.com/nxtbooks/ieee/smc_201807
https://www.nxtbook.com/nxtbooks/ieee/smc_201804
https://www.nxtbook.com/nxtbooks/ieee/smc_201801
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1017
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0717
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0417
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0117
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1016
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0716
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0416
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0116
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_1015
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0715
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0415
https://www.nxtbook.com/nxtbooks/ieee/systems_man_cybernetics_0115
https://www.nxtbookmedia.com