{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:47:20Z","timestamp":1763142440606,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031853555","type":"print"},{"value":"9783031853562","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85356-2_11","type":"book-chapter","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:44:29Z","timestamp":1744803869000},"page":"159-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Supervisory Control of\u00a0Cyber-Physical Systems Using Labeled Petri Nets Under Sensor and\u00a0Actuator Attacks"],"prefix":"10.1007","author":[{"given":"Jintao","family":"Jia","sequence":"first","affiliation":[]},{"given":"Gaiyun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiwu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119683","volume":"650","author":"US Abubakar","year":"2023","unstructured":"Abubakar, U.S., Liu, G., Barkaoui, K., Li, Z.: Adaptive supervisory control for a class of Petri nets with bimodal transitions. Inf. Sci. 650, 119683 (2023)","journal-title":"Inf. Sci."},{"key":"11_CR2","unstructured":"Baheti, R., Gill, H.: Cyber-physical systems. In: The Impact of Control Technology, vol. 12, no. 1, pp. 161\u2013166 (2011)"},{"key":"11_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.110119","volume":"137","author":"H Boucheneb","year":"2022","unstructured":"Boucheneb, H., Barkaoui, K., Xing, Q., Wang, K., Liu, G., Li, Z.: Time based deadlock prevention for Petri nets. Automatica 137, 110119 (2022)","journal-title":"Automatica"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1813","DOI":"10.1109\/TAC.2016.2592952","volume":"62","author":"MP Cabasino","year":"2016","unstructured":"Cabasino, M.P., Hadjicostis, C.N., Seatzu, C.: Marking observer in labeled Petri nets with application to supervisory control. IEEE Trans. Autom. Control 62(4), 1813\u20131824 (2016)","journal-title":"IEEE Trans. Autom. Control"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.automatica.2018.07.017","volume":"97","author":"LK Carvalho","year":"2018","unstructured":"Carvalho, L.K., Wu, Y.C., Kwong, R., Lafortune, S.: Detection and mitigation of classes of attacks in supervisory control systems. Automatica 97, 121\u2013133 (2018)","journal-title":"Automatica"},{"issue":"17","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/math12172635","volume":"12","author":"S Ding","year":"2024","unstructured":"Ding, S., Liu, G., Yin, L., Wang, J., Li, Z.: Detection of cyber-attacks in a discrete event system based on deep learning. Mathematics 12(17), 1\u201321 (2024)","journal-title":"Mathematics"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Gao, C., Seatzu, C., Li, Z., Giua, A.: Multiple attacks detection on discrete event systems. In: 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), pp. 2352\u20132357 (2019)","DOI":"10.1109\/SMC.2019.8914035"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"G\u00f3es, R.M., Kang, E., Kwong, R., Lafortune, S.: Stealthy deception attacks for cyber-physical systems. In: 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pp. 4224\u20134230. IEEE (2017)","DOI":"10.1109\/CDC.2017.8264281"},{"key":"11_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109172","volume":"121","author":"RM G\u00f3es","year":"2020","unstructured":"G\u00f3es, R.M., Kang, E., Kwong, R., Lafortune, S.: Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems. Automatica 121, 109172 (2020)","journal-title":"Automatica"},{"issue":"4","key":"11_CR10","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1093\/imamci\/dnt029","volume":"31","author":"GY Liu","year":"2014","unstructured":"Liu, G.Y., Chao, D.Y., Uzam, M.: A merging method for the siphon-based FMS maximally permissive controllers with simpler structures. IMA J. Math. Control. Inf. 31(4), 551\u2013573 (2014)","journal-title":"IMA J. Math. Control. Inf."},{"key":"11_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JAS.2024.124983","volume":"12","author":"T Qin","year":"2025","unstructured":"Qin, T., Yin, L., Liu, G., Wu, N., Li, Z.: Strong current-state opacity verification of discrete-event systems modeled with time labeled Petri nets. IEEE\/CAA J. Autom. Sin. 12, 1\u201315 (2025)","journal-title":"IEEE\/CAA J. Autom. Sin."},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"PJ Ramadge","year":"1987","unstructured":"Ramadge, P.J., Wonham, W.M.: Supervisory control of a class of discrete event processes. SIAM J. Control. Optim. 25(1), 206\u2013230 (1987)","journal-title":"SIAM J. Control. Optim."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Shen, C., Liu, G., Zhong, C., Barkaoui, K.: Analysis of effectiveness and stealthiness of sensor attacks in labeled Petri nets. In: 2023 IEEE International Conference on Networking, Sensing and Control (ICNSC), vol.\u00a01, pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/ICNSC58704.2023.10318984"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.automatica.2018.04.006","volume":"94","author":"R Su","year":"2018","unstructured":"Su, R.: Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations. Automatica 94, 35\u201344 (2018)","journal-title":"Automatica"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Thorsley, D., Teneketzis, D.: Intrusion detection in controlled discrete event systems. In: Proceedings of the 45th IEEE Conference on Decision and Control, pp. 6047\u20136054. IEEE (2006)","DOI":"10.1109\/CDC.2006.377810"},{"issue":"6","key":"11_CR16","doi-asserted-by":"publisher","first-page":"2823","DOI":"10.1109\/TAC.2016.2620429","volume":"62","author":"Y Tong","year":"2016","unstructured":"Tong, Y., Li, Z., Seatzu, C., Giua, A.: Verification of state-based opacity using Petri nets. IEEE Trans. Autom. Control 62(6), 2823\u20132837 (2016)","journal-title":"IEEE Trans. Autom. Control"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1007\/s13235-018-0285-3","volume":"9","author":"M Wakaiki","year":"2019","unstructured":"Wakaiki, M., Tabuada, P., Hespanha, J.P.: Supervisory control of discrete-event systems under attacks. Dyn. Games Appl. 9, 965\u2013983 (2019)","journal-title":"Dyn. Games Appl."},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.ins.2021.03.033","volume":"562","author":"Y Wang","year":"2021","unstructured":"Wang, Y., Li, Y., Yu, Z., Wu, N., Li, Z.: Supervisory control of discrete-event systems under external attacks. Inf. Sci. 562, 398\u2013413 (2021)","journal-title":"Inf. Sci."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Wonham, W.M., Cai, K.: Supervisory Control of Discrete-Event Systems. Springer (2019)","DOI":"10.1007\/978-3-319-77452-7"},{"issue":"4","key":"11_CR20","doi-asserted-by":"publisher","first-page":"2398","DOI":"10.1109\/TSMC.2021.3051096","volume":"52","author":"D You","year":"2021","unstructured":"You, D., Wang, S., Seatzu, C.: A liveness-enforcing supervisor tolerant to sensor-reading modification attacks. IEEE Trans. Syst. Man Cybern. Syst. 52(4), 2398\u20132411 (2021)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Liu, G., Li, Z.: Adaptive supervisory control of automated manufacturing systems with unreliable resources based on smart switch controllers. IEEE Trans. Autom. Sci. Eng. 21(4), 5445\u20135456 (2024)","DOI":"10.1109\/TASE.2023.3312222"}],"container-title":["Lecture Notes in Computer Science","Verification and Evaluation of Computer and Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85356-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:44:37Z","timestamp":1744803877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85356-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031853555","9783031853562"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VECoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification and Evaluation of Computer and Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Djerba","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vecos2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.vecos-world.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}