{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:54:27Z","timestamp":1743126867131,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031161582"},{"type":"electronic","value":"9783031161599"}],"license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-16159-9_9","type":"book-chapter","created":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T11:02:48Z","timestamp":1661943768000},"page":"100-111","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Controller Modelling as\u00a0a\u00a0Tool for\u00a0Cyber-Attacks Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6464-8194","authenticated-orcid":false,"given":"Anna","family":"Sztyber","sequence":"first","affiliation":[]},{"given":"Zuzanna","family":"G\u00f3recka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8947-2025","authenticated-orcid":false,"given":"Jan Maciej","family":"Ko\u015bcielny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7741-607X","authenticated-orcid":false,"given":"Micha\u0142","family":"Syfert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,1]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abbaspour, A., Sargolzaei, A., Yen, K.: Detection of false data injection attack on load frequency control in distributed power systems. In: 2017 North American Power Symposium (NAPS), pp.\u00a01\u20136 (2017)","DOI":"10.1109\/NAPS.2017.8107333"},{"issue":"4","key":"9_CR2","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1016\/j.ifacol.2018.06.173","volume":"51","author":"M Bauer","year":"2018","unstructured":"Bauer, M., Auret, L., le Roux, D., Aharonson, V.: An industrial PID data repository for Control Loop Performance Monitoring (CPM). IFAC-PapersOnLine 51(4), 823\u2013828 (2018)","journal-title":"IFAC-PapersOnLine"},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jprocont.2015.11.002","volume":"38","author":"M Bauer","year":"2016","unstructured":"Bauer, M., Horch, A., Xie, L., Jelali, M., Thornhill, N.: The current state of control loop performance monitoring - A survey of application in industry. J. Process Control 38, 1\u201310 (2016)","journal-title":"J. Process Control"},{"key":"9_CR4","unstructured":"Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., Sastry, S.: Challenges for securing cyber physical systems. In: Workshop on Future Directions in Cyber-physical Systems Security (2009)"},{"issue":"5","key":"9_CR5","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1109\/TCST.2020.3027809","volume":"29","author":"T Cong","year":"2021","unstructured":"Cong, T., Tan, R., Ottewill, J.R., Thornhill, N.F., Baranowski, J.: Anomaly detection and mode identification in multimode processes using the field Kalman filter. IEEE Trans. Control Syst. Technol. 29(5), 2192\u20132205 (2021)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Ding, D., Han, Q.L., Xiang, Y., Ge, X., Zhang, X.M.: A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275(C), 1674-1683 (2018)","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Genge, B., Kiss, I., Haller, P.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastruct. Prot. 10(C), 3-17 (2015)","DOI":"10.1016\/j.ijcip.2015.04.001"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1002\/cjce.5450670519","volume":"67","author":"TJ Harris","year":"1989","unstructured":"Harris, T.J.: Assessment of control loop performance. Can. J. Chem. Eng. 67, 856\u2013861 (1989)","journal-title":"Can. J. Chem. Eng."},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1389-1","volume":"2019","author":"Y Hu","year":"2019","unstructured":"Hu, Y., Li, H., Yang, H., Sun, Y., Sun, L., Wang, Z.: Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP J. Wirel. Commun. Netw. 2019(1), 1\u201314 (2019). https:\/\/doi.org\/10.1186\/s13638-019-1389-1","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"5","key":"9_CR10","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"9_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4546-2","volume-title":"Control Performance Management in Industrial Automation: Assessment Diagnosis and Improvement of Control Loop","author":"M Jelali","year":"2013","unstructured":"Jelali, M.: Control Performance Management in Industrial Automation: Assessment Diagnosis and Improvement of Control Loop. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4546-2"},{"key":"9_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18615-8","volume-title":"Fault Diagnosis: Models, Artificial Intelligence Methods, Applications","year":"1998","unstructured":"Korbicz, J., Kowalczuk, Z., Ko\u015bcielny, J.M., Cholewa, W. (eds.): Fault Diagnosis: Models, Artificial Intelligence Methods, Applications. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/978-3-642-18615-8"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Ko\u015bcielny, J.: Towards a unified approach to detection of faults and cyber-attacks in industrial installations. In: European Control Conference, pp. 1839\u20131844 (2021)","DOI":"10.23919\/ECC54610.2021.9655212"},{"key":"9_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-319-64474-5_38","volume-title":"Advanced Solutions in Diagnostics and Fault Tolerant Control","author":"JM Ko\u015bcielny","year":"2018","unstructured":"Ko\u015bcielny, J.M., Syfert, M., Wnuk, P.: The idea of on-line diagnostics as a method of cyberattack recognition. In: Ko\u015bcielny, J.M., Syfert, M., Sztyber, A. (eds.) DPS 2017. AISC, vol. 635, pp. 449\u2013457. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-64474-5_38"},{"issue":"4","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46(4), 1\u201329 (2014)","journal-title":"ACM Comput. Surv."},{"issue":"11","key":"9_CR16","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti, F., D\u00f6rfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715\u20132729 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Rubio, J.E., Roman, R., Lopez, J.: Analysis of cybersecurity threats in industry 4.0: the case of intrusion detection. In: D\u2019Agostino, G., Scala, A. (eds.) CRITIS 2017. LNCS, vol. 10707, pp. 119\u2013130. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99843-5_11","DOI":"10.1007\/978-3-319-99843-5_11"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.arcontrol.2019.08.002","volume":"48","author":"HS S\u00e1nchez","year":"2019","unstructured":"S\u00e1nchez, H.S., Rotondo, D., Escobet, T., Puig, V., Quevedo, J.: Bibliographical review on cyber attacks from a control oriented perspective. Annu Rev. Control 48, 103\u2013128 (2019)","journal-title":"Annu Rev. Control"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Trapiello, C., Puig, V.: Replay attack detection using a zonotopic KF and LQ approach. In: 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 3117\u20133122 (2020)","DOI":"10.1109\/SMC42975.2020.9282865"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Urbina, D.I., et al.: Limiting the impact of stealthy attacks on industrial control systems. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1092-1105 (2016)","DOI":"10.1145\/2976749.2978388"},{"issue":"10","key":"9_CR21","doi-asserted-by":"publisher","first-page":"173","DOI":"10.3390\/math6100173","volume":"6","author":"Z Wu","year":"2018","unstructured":"Wu, Z., Albalawi, F., Zhang, J., Zhang, Z., Durand, H., Christofides, P.D.: Detecting and handling cyber-attacks in model predictive control of chemical processes. Mathematics 6(10), 173 (2018)","journal-title":"Mathematics"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent and Safe Computer Systems in Control and Diagnostics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16159-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T10:04:31Z","timestamp":1664186671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16159-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"ISBN":["9783031161582","9783031161599"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16159-9_9","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022,9,1]]},"assertion":[{"value":"1 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Diagnostics of Processes and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chmielno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dps2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dps2022.konsulting.gda.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}