{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T06:25:17Z","timestamp":1777443917577,"version":"3.51.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319728162","type":"print"},{"value":"9783319728179","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_12","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T16:44:29Z","timestamp":1513874669000},"page":"177-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Multistage Downstream Attack Detection in a Cyber Physical System"],"prefix":"10.1007","author":[{"given":"Rizwan","family":"Qadeer","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Murguia","sequence":"additional","affiliation":[]},{"given":"Chuadhry Mujeeb","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Ruths","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Sridhar, A., Aditya, M.: Limitations of state estimation based cyber attack detection schemes in industrial control systems. In: IEEE Smart City Security and Privacy Workshop, CPSWeek (2016)","DOI":"10.1109\/SCSPW.2016.7509557"},{"key":"12_CR2","unstructured":"Ahmed, C.M., Murguia, C., Ruths, J.: Model-based attack detection scheme for smart water distribution networks. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 101\u2013113. ACM, New York (2017). http:\/\/doi.acm.org\/10.1145\/3052973.3053011"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Bai, C.Z., Gupta, V.: On Kalman filtering in the presence of a compromised sensor: fundamental performance bounds. In: 2014 American Control Conference, pp. 3029\u20133034. IEEE (2014)","DOI":"10.1109\/ACC.2014.6859155"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bai, C.Z., Pasqualetti, F., Gupta, V.: Security in stochastic control systems: fundamental limitations and performance bounds. In: 2015 American Control Conference (ACC), pp. 195\u2013200. IEEE (2015)","DOI":"10.1109\/ACC.2015.7170734"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 355\u2013366. ACM (2011)","DOI":"10.1145\/1966913.1966959"},{"key":"12_CR6","unstructured":"ICS-CERT: Ics-mm201408: May-august 2014. Report no., U.S. Department of Homeland Security-Industrial Control Systems-Cyber Emergency Response Team, Washington, D.C. (2014). https:\/\/ics-cert.us-cert.gov"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: American Control Conference (ACC), pp. 3344\u20133349 (2013)","DOI":"10.1109\/ACC.2013.6580348"},{"key":"12_CR8","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. EECS Department, University of California, Berkeley, Technical report UCB\/EECS-2008-8, January 2008. http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008-8.html"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Miao, F., Zhu, Q., Pajic, M., Pappas, G.J.: Coding sensor outputs for injection attacks detection. In: IEEE Conference in Decision and Control (CDC), pp. 5776\u20135781 (2014)","DOI":"10.1109\/CDC.2014.7040293"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Mo, Y., Garone, E., Casavola, A., Sinopoli, B.: False data injection attacks against state estimation in wireless sensor networks. In: 49th IEEE Conference on Decision and Control (CDC), pp. 5967\u20135972. IEEE (2010)","DOI":"10.1109\/CDC.2010.5718158"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Mujeeb, C.A., Mathur, A.P.: Hardware identification via sensor fingerprinting in a cyber physical system. In: 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 517\u2013524. IEEE (2017)","DOI":"10.1109\/QRS-C.2017.89"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Murguia, C., Ruths, J.: Characterization of a CUSUM model-based sensor attack detector. In: 55th IEEE Conference on Decision and Control Conference (CDC) (2016)","DOI":"10.1109\/CDC.2016.7798446"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Murguia, C., Ruths, J.: CUSUM and chi-squared attack detection of compromised sensors. In: 2016 IEEE Conference on Control Applications (CCA), pp. 474\u2013480, September 2016","DOI":"10.1109\/CCA.2016.7587875"},{"issue":"11","key":"12_CR14","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"Pasqualetti, F., D\u00f6rfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715\u20132729 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"key":"12_CR15","volume-title":"Introduction to Probability Models","author":"M Ross","year":"2006","unstructured":"Ross, M.: Introduction to Probability Models, 9th edn. Academic Press Inc., Orlando (2006)","edition":"9"},{"key":"12_CR16","unstructured":"Sridhar, A., Aditya, M.: Generalized attacker and attack models for cyber physical systems. In: 40th IEEE COMPSAC (2016)"},{"key":"12_CR17","unstructured":"Urbina, D., Giraldo, J., Tippenhauer, N.O., Cardenas, A.: Attacking Fieldbus communications in ICS: applications to the SWaT Testbed. In: Singapore Cyber-Security Conference (SG-CRC), vol. 14, pp. 75\u201389 (2016)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Urbina, D.I., Giraldo, J., Cardenas, A.A., Tippenhauer, N.O., Valente, J., Faisal, M., Ruths, J., Candell, R., Sandberg, H.: Limiting the impact of stealthy attacks on industrial control systems. In: ACM CCS 3(iii) (2016)","DOI":"10.1145\/2976749.2978388"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T03:42:15Z","timestamp":1751168535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}