{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:59:17Z","timestamp":1754485157431,"version":"3.28.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T00:00:00Z","timestamp":1699401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00773-0","type":"journal-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T11:02:28Z","timestamp":1699441348000},"page":"999-1017","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Locating collaborative attack targets based on physical invariants toward cyber-physical systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Peng","family":"Xun","sequence":"first","affiliation":[]},{"given":"Ziyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Haoyang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,8]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Karnouskos, S.: Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society, pp. 4490\u20134494 (2011)","key":"773_CR1","DOI":"10.1109\/IECON.2011.6120048"},{"unstructured":"Cyber-attack against ukrainian critical infrastructure (2016). https:\/\/www.ics-cert.us-cert.gov\/alerts\/IRALERTH-16-056-01\/","key":"773_CR2"},{"doi-asserted-by":"crossref","unstructured":"Lakshminarayana, S., Teo, Z., Tan, R., Yau, D., et al.: On false data injection attacks against railway traction power systems. In IEEE\/IFIP International Conference on Dependable System and Networks, pp. 383\u2013394 (2016)","key":"773_CR3","DOI":"10.1109\/DSN.2016.42"},{"issue":"15","key":"773_CR4","doi-asserted-by":"publisher","first-page":"14116","DOI":"10.1109\/JIOT.2022.3147040","volume":"9","author":"J Tian","year":"2022","unstructured":"Tian, J., Wang, B., Li, J., Wang, Z., Ma, B., Ozay, M.: Exploring targeted and stealthy false data injection attacks via adversarial machine learning. IEEE Internet Things J. 9(15), 14116 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2016","key":"773_CR5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.cose.2016.01.001","volume":"58","author":"W Li","year":"2016","unstructured":"Li, W., Xie, L., Deng, Z., Wang, Z.: False sequential logic attack on SCADA system and its physical impact analysis. Comput. Secur. 58(2016), 149 (2016)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Xie, L., Mo, Y., Sinopoli, B.: False data injection attacks in electricity markets. In 2010 First IEEE International Conference on Smart Grid Communications, pp. 226\u2013231 (2010)","key":"773_CR6","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"773_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.isatra.2023.01.020","volume":"137","author":"YG Li","year":"2023","unstructured":"Li, Y.G., Yang, G.H., Wang, X.: Optimal energy constrained deception attacks in cyber-physical systems with multiple channels: a fusion attack approach. ISA Trans. 137, 1 (2023)","journal-title":"ISA Trans."},{"doi-asserted-by":"crossref","unstructured":"Garcia, L.A., Brasser, F., Cintuglu, M.H., Sadeghi, A.R., et al.: Hey, My Malware Knows Physics! Attacking PLCs with physical model aware rootkit. In Network and Distributed System Security Symposium, pp. 1\u201315 (2017)","key":"773_CR8","DOI":"10.14722\/ndss.2017.23313"},{"doi-asserted-by":"crossref","unstructured":"Zhu, Y., Yan, J., Tang, Y., Sun, Y.L., He, H.: Coordinated attacks against substations and transmission lines in power grids. In 2014 IEEE Global Communications Conference, pp. 655\u2013661 (2014)","key":"773_CR9","DOI":"10.1109\/GLOCOM.2014.7036882"},{"doi-asserted-by":"crossref","unstructured":"Zhang, L., Chen, X., Kong, F., Cardenas, A.: Real-time attack-recovery for cyber-physical systems using linear approximations. In IEEE Real-Time Systems Symposium, pp. 205\u2013217 (2020)","key":"773_CR10","DOI":"10.1109\/RTSS49844.2020.00028"},{"issue":"2","key":"773_CR11","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/JIOT.2020.3005926","volume":"8","author":"X Luo","year":"2021","unstructured":"Luo, X., Li, Y., Wang, X., Guan, X.: Interval observer-based detection and localization against false data injection attack in smart grids. IEEE Internet Things J. 8(2), 657 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"773_CR12","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TSG.2021.3117977","volume":"13","author":"O Boyaci","year":"2022","unstructured":"Boyaci, O., Narimani, M.R., Davis, K.R., Ismail, M., Overbye, T.J., Serpedin, E.: Joint detection and localization of stealth false data injection attacks in smart grids using graph neural networks. IEEE Trans. Smart Grid 13(1), 807 (2022)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"9","key":"773_CR13","doi-asserted-by":"publisher","first-page":"8218","DOI":"10.1109\/JIOT.2020.2983911","volume":"7","author":"S Wang","year":"2020","unstructured":"Wang, S., Narimani, S.B., Zhang, Y.J.A.: Locational detection of the false data injection attack in a smart grid: a multilabel classification approach. IEEE Internet Things J. 7(9), 8218 (2020)","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., Reiter, M.K.: False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 21\u201332 (2008)","key":"773_CR14","DOI":"10.1145\/1653662.1653666"},{"issue":"12","key":"773_CR15","doi-asserted-by":"publisher","first-page":"13699","DOI":"10.1109\/TCYB.2021.3125345","volume":"52","author":"J Tian","year":"2022","unstructured":"Tian, J., Wang, B., Wang, Z., Cao, K., Li, J., Ozay, M.: Joint adversarial example and false data injection attacks for state estimation in power systems. IEEE Trans. Cybern. 52(12), 13699 (2022)","journal-title":"IEEE Trans. Cybern."},{"doi-asserted-by":"crossref","unstructured":"Kulandaivel, S., Jain, S., Guajardo, J., Sekar, V.: CANNON: reliable and stealthy remote shutdown attacks via unaltered automotive microcontrollers. In IEEE Symposium on Security and Privacy, pp. 195\u2013210 (2021)","key":"773_CR16","DOI":"10.1109\/SP40001.2021.00122"},{"doi-asserted-by":"crossref","unstructured":"Mathur, A.P., Tippenhauer, N.O.: SWaT: a water treatment testbed for research and training on ICS security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, pp. 31\u201336 (2016)","key":"773_CR17","DOI":"10.1109\/CySWater.2016.7469060"},{"issue":"2016","key":"773_CR18","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.future.2015.06.006","volume":"56","author":"F Hu","year":"2016","unstructured":"Hu, F., Lu, Y., Vasilakos, A.V., Hao, Q., et al.: Robust cyber physical systems: concept, models, and implementation. Future Gener. Comput. Syst. 56(2016), 449 (2016)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"773_CR19","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/TSG.2011.2119336","volume":"2","author":"TT Kim","year":"2011","unstructured":"Kim, T.T., Poor, H.V.: Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2(2), 326 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"doi-asserted-by":"crossref","unstructured":"Lin, H., Alemzadeh, H., Chen, D., Kalbarczyk, Z., et al.: Safety-critical cyber-physical attacks: analysis, detection, and mitigation. In Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 82\u201389 (2016)","key":"773_CR20","DOI":"10.1145\/2898375.2898391"},{"issue":"22","key":"773_CR21","doi-asserted-by":"publisher","first-page":"22399","DOI":"10.1109\/JIOT.2021.3111024","volume":"9","author":"J Tian","year":"2022","unstructured":"Tian, J., Wang, B., Guo, R., Wang, Z., Cao, K., Wang, X.: Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles. IEEE Internet Things J. 9(22), 22399 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"773_CR22","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TNSE.2021.3135565","volume":"9","author":"J Tian","year":"2022","unstructured":"Tian, J., Wang, B., Li, J., Wang, Z.: Adversarial attacks and defense for CNN based power quality recognition in smart grid. IEEE Trans. Netw. Sci. Eng. 9(2), 807 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"Gupta, C.: Event correlation for operations management of largescale IT systems. In Proceedings of the 9th International Conference on Autonomic Computing, pp. 91\u201396 (2012)","key":"773_CR23","DOI":"10.1145\/2371536.2371552"},{"doi-asserted-by":"crossref","unstructured":"Vu, Q.D., Tan, R., Yau, D.K.Y.: On applying fault detectors against false data injection attacks in cyber-physical control systems. In IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on Computer Communications, pp. 1\u20139 (2016)","key":"773_CR24","DOI":"10.1109\/INFOCOM.2016.7524506"},{"issue":"2","key":"773_CR25","doi-asserted-by":"publisher","first-page":"1640","DOI":"10.1109\/TSG.2020.3034745","volume":"12","author":"J Danial","year":"2021","unstructured":"Danial, J., Keyhan, S., Marthe, K., Younes, S.: Countering FDI attacks on DERs coordinated control system using FMI-compatible cosimulation. IEEE Trans. Smart Grid 12(2), 1640 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"773_CR26","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/TII.2019.2962759","volume":"17","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Hu, W., Alam, M., Wu, T.: Fiden: intelligent fingerprint learning for attacker identification in the industrial internet of things. IEEE Trans. Ind. Inform. 17(2), 882 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"4","key":"773_CR27","doi-asserted-by":"publisher","first-page":"6498","DOI":"10.1109\/JIOT.2019.2916670","volume":"6","author":"X Wang","year":"2019","unstructured":"Wang, X., Luo, X., Zhang, Y., Guan, X.: Detection and Isolation of False Data Injection Attacks in Smart Grids via Nonlinear Interval Observer. IEEE Internet Things J. 6(4), 6498 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"773_CR28","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1109\/TSG.2020.3028761","volume":"12","author":"SN Edib","year":"2021","unstructured":"Edib, S.N., Lin, Y., Vokkarane, V.M., Qiu, F., Yao, R., Zhao, D.: Optimal PMU restoration for power system observability recovery after massive attacks. IEEE Trans. Smart Grid 12(2), 1565 (2021)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"773_CR29","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TDSC.2011.16","volume":"8","author":"M Jiang","year":"2011","unstructured":"Jiang, M., Munawar, M.A., Reidemeister, T., Ward, P.A.S.: Efficient fault detection and diagnosis in complex software systems with information-theoretic monitoring. IEEE Trans. Depend. Secure Comput. 8(4), 510 (2011)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"2","key":"773_CR30","first-page":"8:1","volume":"8","author":"Y Ge","year":"2014","unstructured":"Ge, Y., Jiang, G., Ding, M., Xiong, H.: Time series segmentation to discover behavior switching in complex physical systems. ACM Trans. Knowl. Discov. Data 8(2), 8:1 (2014)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"doi-asserted-by":"crossref","unstructured":"Sharma, A.B., Chen, H., Ding, M., Yoshihira, K., Jiang, G.: Fault detection and localization in distributed systems using invariant relationships. In 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), 00, pp. 1\u20138 (2013)","key":"773_CR31","DOI":"10.1109\/DSN.2013.6575304"},{"issue":"2019","key":"773_CR32","doi-asserted-by":"publisher","first-page":"95812","DOI":"10.1109\/ACCESS.2019.2929785","volume":"7","author":"B Chen","year":"2019","unstructured":"Chen, B., Li, H., Zhou, B.: Real-time identification of false data injection attacks: a novel dynamic-static parallel state estimation based mechanism. IEEE Access 7(2019), 95812 (2019)","journal-title":"IEEE Access"},{"unstructured":"Zeng, R., Zeng, C., Wang, X., Li, B., Chu, X.: IEEE Network (In Press)","key":"773_CR33"},{"doi-asserted-by":"crossref","unstructured":"Cheng, L., Tian, K., Yao, D.: Orpheus: enforcing cyber-physical execution semantics to defend against data-oriented attacks. In Proceedings of the 33rd Annual Computer Security Applications Conference, pp. 315\u2013326 (2017)","key":"773_CR34","DOI":"10.1145\/3134600.3134640"},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., Poskitt, C.M., Sun, J.: Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In IEEE Symposium on Security and Privacy, pp. 648\u2013660 (2018)","key":"773_CR35","DOI":"10.1109\/SP.2018.00016"},{"issue":"1","key":"773_CR36","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TAC.2021.3079284","volume":"67","author":"L An","year":"2022","unstructured":"An, L., Yang, G.: Collisions-free distributed optimal coordination for multiple Euler\u2013Lagrangian systems. IEEE Trans. Autom. Control. 67(1), 460 (2022)","journal-title":"IEEE Trans. Autom. Control."},{"issue":"12","key":"773_CR37","doi-asserted-by":"publisher","first-page":"6850","DOI":"10.1109\/TAC.2021.3133269","volume":"67","author":"L An","year":"2022","unstructured":"An, L., Yang, G.H.: Distributed optimal coordination for heterogeneous linear multiagent systems. IEEE Trans. Autom. Control 67(12), 6850 (2022)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"4","key":"773_CR38","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1109\/TII.2017.2676005","volume":"13","author":"AO de Sa","year":"2017","unstructured":"de Sa, A.O., Carmo, L.F.R.D.C., Machado, R.C.S.: Covert attacks in cyber-physical control systems. IEEE Trans. Ind. Inform. 13(4), 1641 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Tu, W., Hui, L.C.K., Yiu, S., Wang, E.K.: Detecting time synchronization attacks in cyber-physical systems with machine learning techniques. In 37th IEEE International Conference on Distributed Computing Systems, pp. 2246\u20132251 (2017)","key":"773_CR39","DOI":"10.1109\/ICDCS.2017.25"},{"doi-asserted-by":"crossref","unstructured":"Luo, C., Lou, J.G., Lin, Q., Fu, Q., et al.: Correlating events with time series for incident diagnosis. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1583\u20131592 (2014)","key":"773_CR40","DOI":"10.1145\/2623330.2623374"},{"doi-asserted-by":"crossref","unstructured":"Xun, P., Zhu, P.D., Li, C.L., Zhu, H.Y.: Discovering multi-type correlated events with time series for exception detection of complex systems. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 21\u201328 (2016)","key":"773_CR41","DOI":"10.1109\/ICDMW.2016.0012"},{"issue":"2021","key":"773_CR42","doi-asserted-by":"publisher","first-page":"122385","DOI":"10.1109\/ACCESS.2021.3109465","volume":"9","author":"L Faramondi","year":"2021","unstructured":"Faramondi, L., Flammini, F., Guarino, S., Setola, R.: A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing. IEEE Access 9(2021), 122385 (2021)","journal-title":"IEEE Access"},{"unstructured":"Matpower (2022). https:\/\/matpower.org\/","key":"773_CR43"},{"doi-asserted-by":"crossref","unstructured":"Mishra, S., Li, X., Kuhnle, A., Thai, M.T., Seo, J.: Rate alteration attacks in smart grid. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2353\u20132361 (2015)","key":"773_CR44","DOI":"10.1109\/INFOCOM.2015.7218623"},{"issue":"3","key":"773_CR45","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1109\/TPWRS.2007.901489","volume":"22","author":"JA Short","year":"2007","unstructured":"Short, J.A., Infield, D.G., Freris, L.L.: Stabilization of grid frequency through dynamic demand control. IEEE Trans. Power Syst. 22(3), 1284 (2007)","journal-title":"IEEE Trans. Power Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00773-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00773-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00773-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T17:22:09Z","timestamp":1730481729000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00773-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,8]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["773"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00773-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2023,11,8]]},"assertion":[{"value":"8 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human participants.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}