{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:05:57Z","timestamp":1767704757697,"version":"3.41.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_6","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T07:35:53Z","timestamp":1501918553000},"page":"62-74","source":"Crossref","is-referenced-by-count":12,"title":["Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs"],"prefix":"10.1007","author":[{"given":"Emrah","family":"Korkmaz","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Dolgikh","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Skormin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"6_CR1","unstructured":"ICS-CERT monitor. https:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/Monitors\/ICS-CERTMonitorMay-Jun2015.pdf . Accessed 14 July 2016"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Antonioli, D., Tippenhauer, N.O.: Minicps: a toolkit for security research on cps networks. In: Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and\/or Privacy, pp. 91\u2013100. ACM (2015)","DOI":"10.1145\/2808705.2808715"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Cruz, T., Barrigas, J., Proen\u00e7a, J., Graziano, A., Panzieri, S., Lev, L., Sim\u00f5es, P.: Improving network security monitoring for industrial control systems. In: 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 878\u2013881. IEEE (2015)","DOI":"10.1109\/INM.2015.7140399"},{"key":"6_CR4","unstructured":"Fan, W.-H., Cai, H., Chen, Q.-W., Hu, W.-L.: Stability of networked control systems with time-delay. Kongzhi Lilun yu Yingyong\/Control Theory Appl. (China), 21(6), 880\u2013884 (2004)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Michiels, W., Niculescu, S.-I.: Stability, control, and computation for time-delay systems: an eigenvalue-based approach, vol. 27. Siam (2014)","DOI":"10.1137\/1.9781611973631"},{"key":"6_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84800-215-9","volume-title":"Networked control systems","author":"F-Y Wang","year":"2008","unstructured":"Wang, F.-Y., Liu, D.: Networked control systems. Springer, London (2008)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Xiao, L., Hassibi, A., How, J. P.: Control with random communication delays via a discrete-time jump system approach. In: Proceedings of the 2000 American Control Conference. vol. 3, pp. 2199\u20132204. IEEE (2000)","DOI":"10.1109\/ACC.2000.879591"},{"issue":"17","key":"6_CR8","doi-asserted-by":"crossref","first-page":"3481","DOI":"10.1016\/S0009-2509(00)00005-1","volume":"55","author":"Y Lee","year":"2000","unstructured":"Lee, Y., Lee, J., Park, S.: PID controller tuning for integrating and unstable processes with time delay. Chem. Eng. Sci. 55(17), 3481\u20133493 (2000)","journal-title":"Chem. Eng. Sci."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, R.A., Chow, M.-Y.: Performance assessment and compensation for secure networked control systems. In: 34th Annual Conference of IEEE Industrial Electronics. IECON 2008, pp. 2929\u20132934. IEEE (2008)","DOI":"10.1109\/IECON.2008.4758425"},{"key":"6_CR10","unstructured":"Larsen, J.: Controlling without modifying: the stale data problem. In: S4x16, Miami, US, January 2016"},{"issue":"4","key":"6_CR11","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.ijcip.2014.10.003","volume":"7","author":"M Krotofil","year":"2014","unstructured":"Krotofil, M., Cardenas, A., Larsen, J., Gollmann, D.: Vulnerabilities of cyber-physical systems to stale data: determining the optimal time to launch attacks. Int. J. Crit. Infrastruct. Prot. 7(4), 213\u2013232 (2014)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"12","key":"6_CR12","doi-asserted-by":"crossref","first-page":"3224","DOI":"10.1109\/TAC.2014.2351871","volume":"59","author":"P Lee","year":"2014","unstructured":"Lee, P., Clark, A., Bushnell, L., Poovendran, R.: A passivity framework for modeling and mitigating wormhole attacks on networked control systems. IEEE Trans. Autom. Control 59(12), 3224\u20133237 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2","key":"6_CR13","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","volume":"24","author":"Y-C Hu","year":"2006","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370\u2013380 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"6_CR14","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2012","unstructured":"Sridhar, S., Hahn, A., Govindarasu, M.: Cyber\u2013physical system security for the electric power grid. Proc. IEEE 100(1), 210\u2013224 (2012)","journal-title":"Proc. IEEE"},{"key":"6_CR15","first-page":"55","volume":"5","author":"A Sargolzaei","year":"2013","unstructured":"Sargolzaei, A., Yen, K.K., Abdelghani, M.: Time-delay switch attack on load frequency control in smart grid. Adv. Commun. Technol. 5, 55\u201364 (2013)","journal-title":"Adv. Commun. Technol."},{"issue":"2","key":"6_CR16","first-page":"1176","volume":"7","author":"A Sargolzaei","year":"2016","unstructured":"Sargolzaei, A., Yen, K.K., Abdelghani, M.: Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Trans. Smart Grid 7(2), 1176\u20131185 (2016)","journal-title":"IEEE Trans. Smart Grid"},{"key":"6_CR17","unstructured":"Korkmaz, E., Dolgikh, A., Davis, M., Skormin, V.: Industrial control systems security testbed. In: 11th Annual Symposium on Information Assurance (ASIA 2016), pp. 13\u201318, June 2016"},{"issue":"1","key":"6_CR18","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/251007.251012","volume":"27","author":"L Rizzo","year":"1997","unstructured":"Rizzo, L.: Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Comput. Commun. Rev. 27(1), 31\u201341 (1997)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"6_CR19","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1764873.1764876","volume":"40","author":"M Carbone","year":"2010","unstructured":"Carbone, M., Rizzo, L.: Dummynet revisited. ACM SIGCOMM Comput. Commun. Rev. 40(2), 12\u201320 (2010)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"7","key":"6_CR20","doi-asserted-by":"crossref","first-page":"3008","DOI":"10.1109\/TIE.2011.2168791","volume":"59","author":"J Hu","year":"2012","unstructured":"Hu, J., Wang, Z., Gao, H., Stergioulas, L.K.: Robust sliding mode control for discrete stochastic systems with mixed time delays, randomly occurring uncertainties, and randomly occurring nonlinearities. IEEE Trans. Ind. Electron. 59(7), 3008\u20133015 (2012)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"1","key":"6_CR21","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1109\/TIE.2013.2248339","volume":"61","author":"R Yang","year":"2014","unstructured":"Yang, R., Liu, G.-P., Shi, P., Thomas, C., Basin, M.V.: Predictive output feedback control for networked control systems. IEEE Trans. Ind. Electron. 61(1), 512\u2013520 (2014)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"6_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-42258-9","volume-title":"Introduction to Process Control","author":"V Skormin","year":"2016","unstructured":"Skormin, V.: Introduction to Process Control. Springer, Cham (2016)"},{"key":"6_CR23","unstructured":"Dolgikh, A., Birnbaum, Z., Skormin, V.: Customized behavioral normalcy profiles for critical infrastructure protection. In: 8th Annual Symposium on Information Assurance (ASIA 2013), Albany, NY, pp. 15\u201322, June 2013"},{"issue":"3","key":"6_CR24","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/TIE.2007.893073","volume":"54","author":"G-P Liu","year":"2007","unstructured":"Liu, G.-P., Xia, Y., Chen, J., Rees, D., Hu, W.: Networked predictive control of systems with random network delays in both forward and feedback channels. IEEE Trans. Ind. Electron. 54(3), 1282\u20131297 (2007)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"6_CR25","unstructured":"Dunning, G.: Controllogix Programmable Automation Controllers with Labs Second Edition. Delmar Cengage Learning (2014)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:42:59Z","timestamp":1750797779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}