{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:42:46Z","timestamp":1769740966136,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T00:00:00Z","timestamp":1631059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discrete Event Dyn Syst"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10626-021-00348-y","type":"journal-article","created":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T05:03:28Z","timestamp":1631077408000},"page":"65-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Probabilistic state estimation for labeled continuous time Markov models with applications to attack detection"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7060-756X","authenticated-orcid":false,"given":"Dimitri","family":"Lefebvre","sequence":"first","affiliation":[]},{"given":"Carla","family":"Seatzu","sequence":"additional","affiliation":[]},{"given":"Christoforos N.","family":"Hadjicostis","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Giua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,8]]},"reference":[{"key":"348_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur R, Dill DL (1994) A theory of timed automata. Theor Comput Sci 126:183\u2013235","journal-title":"Theor Comput Sci"},{"issue":"3","key":"348_CR2","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/0020-0190(79)90002-4","volume":"8","author":"B Aspvall","year":"1979","unstructured":"Aspvall B, Plass MF, Tarjan RE (1979) A linear-time algorithm for testing the truth of certain quantified Boolean formulas. Inf Process Lett 8(3):121\u2013123","journal-title":"Inf Process Lett"},{"key":"348_CR3","doi-asserted-by":"crossref","unstructured":"Cardenas AA, Amin S, Sastry S (2008) Secure control: Towards survivable cyber-physical systems. In: Proc. IEEE int. conf. on distributed computing systems, China, pp 495\u2013500","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"348_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.automatica.2018.07.017","volume":"97","author":"LK Carvalho","year":"2018","unstructured":"Carvalho LK, Wu Y.-C., Kwong R, Lafortune S (2018) Detection and mitigation of classes of attacks in supervisory control systems. Automatica 97:121\u2013133","journal-title":"Automatica"},{"key":"348_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68612-7","volume-title":"Introduction to discrete event systems","author":"CG Cassandras","year":"2008","unstructured":"Cassandras CG, Lafortune S (2008) Introduction to discrete event systems. Springer, New York"},{"key":"348_CR6","doi-asserted-by":"publisher","first-page":"1674","DOI":"10.1016\/j.neucom.2017.10.009","volume":"275","author":"D Ding","year":"2018","unstructured":"Ding D, Han QL, Xiang Y, Ge X, Zhang XM (2018) A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275:1674\u20131683","journal-title":"Neurocomputing"},{"key":"348_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119387596","volume-title":"Markov chains: From theory to implementation and experimentation","author":"PA Gagniuc","year":"2017","unstructured":"Gagniuc PA (2017) Markov chains: From theory to implementation and experimentation. Wiley, USA"},{"key":"348_CR8","doi-asserted-by":"crossref","unstructured":"Gao C, Seatzu C, Li Z, Giua A (2019) Multiple attacks detection on discrete event systems. In: Proc. IEEE-SMC, Italy, pp 2352\u20132357","DOI":"10.1109\/SMC.2019.8914035"},{"key":"348_CR9","doi-asserted-by":"crossref","unstructured":"Gao C, Lefebvre D, Seatzu C, Li Z, Giua A (2020) A region-based approach for state estimation of timed automata under no event observation. In: Proc. IEEE 25th annual conference on emerging technologies and factory automation, Austria, pp 799\u2013804","DOI":"10.1109\/ETFA46521.2020.9211942"},{"key":"348_CR10","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es R, Kang E, Kwong R, Lafortune S (2017) Stealthy deception attacks for cyber-physical systems. In: Proc. IEEE 56th conference on decision and control, Australia, pp 4224\u20134230","DOI":"10.1109\/CDC.2017.8264281"},{"key":"348_CR11","doi-asserted-by":"crossref","unstructured":"Hadjicostis CN, Seatzu C (2016) K-detectability in discrete event systems. In: Proc. IEEE 55th conference on decision and control, Las Vegas, pp 420\u2013425","DOI":"10.1109\/CDC.2016.7798305"},{"key":"348_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30821-6","volume-title":"Estimation and inference in discrete event systems: A model-based approach with finite automata","author":"CN Hadjicostis","year":"2020","unstructured":"Hadjicostis CN (2020) Estimation and inference in discrete event systems: A model-based approach with finite automata. Springer Nature, New York"},{"key":"348_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.isatra.2010.08.003","volume":"50","author":"N Hubballi","year":"2011","unstructured":"Hubballi N, Biswas S, Roopa S, Ratti R, Nandi S (2011) LAN attack detection using discrete event systems. ISA Trans 50:119\u2013130","journal-title":"ISA Trans"},{"key":"348_CR14","volume-title":"A first course in stochastic processes","author":"S Karlin","year":"2012","unstructured":"Karlin S, Taylor HE (2012) A first course in stochastic processes. Academic Press, New York"},{"key":"348_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.sysconle.2015.07.005","volume":"84","author":"C Keroglou","year":"2015","unstructured":"Keroglou C, Hadjicostis CN (2015) Detectability in stochastic discrete event systems. Syst Control Lett 84:21\u201326","journal-title":"Syst Control Lett"},{"key":"348_CR16","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.automatica.2017.08.027","volume":"86","author":"C Keroglou","year":"2017","unstructured":"Keroglou C, Hadjicostis CN (2017) Verification of detectability in probabilistic finite automata. Automatica 86:192\u2013198","journal-title":"Automatica"},{"key":"348_CR17","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.automatica.2019.03.003","volume":"105","author":"A Lai","year":"2019","unstructured":"Lai A, Lahaye S, Giua A (2019) State estimation of max-plus automata with unobservable events. Automatica 105:36\u201342","journal-title":"Automatica"},{"key":"348_CR18","doi-asserted-by":"crossref","unstructured":"Lefebvre D, Seatzu C, Hadjicostis CN, Giua A (2020) Probabilistic verification of attack detection using logical observer. In: Proc. IFAC-WODES. Rio de Janeiro, Brazil","DOI":"10.1016\/j.ifacol.2021.04.010"},{"issue":"3","key":"348_CR19","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s10626-019-00307-8","volume":"30","author":"D Lefebvre","year":"2020","unstructured":"Lefebvre D, Hadjicostis CN (2020) Privacy and safety analysis of timed stochastic discrete event systems using Markovian trajectory-observers. J Discret Event Syst 30(3):413\u2013440","journal-title":"J Discret Event Syst"},{"key":"348_CR20","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.jss.2018.12.006","volume":"149","author":"YZ Lun","year":"2019","unstructured":"Lun YZ, D\u2019Innocenzo A, Smarra F, Malavolta I, Di Benedetto MD (2019) State of the art of cyber-physical systems security: An automatic control perspective. J Syst Softw 149:174\u2013216","journal-title":"J Syst Softw"},{"key":"348_CR21","doi-asserted-by":"crossref","unstructured":"Alves MVS, Basilio JC (2019) State estimation and detectability of networked discrete event systems with multi-channel communication networks. In: Proc. american control conference, USA, pp 5602\u20135607","DOI":"10.23919\/ACC.2019.8814302"},{"key":"348_CR22","doi-asserted-by":"crossref","unstructured":"Meira-G\u00f3es R, Kwong R, Lafortune S (2019) Synthesis of sensor deception attacks for systems modeled as probabilistic automata. In: Proc. american control conference, USA","DOI":"10.23919\/ACC.2019.8814740"},{"key":"348_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810633","volume-title":"Markov chains","author":"JR Norris","year":"1997","unstructured":"Norris JR (1997) Markov chains. Cambridge Press, Cambridge"},{"issue":"2","key":"348_CR24","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner LR (1989) A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc IEEE 77(2):257\u2013286","journal-title":"Proc IEEE"},{"key":"348_CR25","doi-asserted-by":"crossref","unstructured":"Rashidinejad A, Lin LY, Wetzels B, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: An overview and outlook. In: Proc. european control conf., Italy, pp 1732\u20131739","DOI":"10.23919\/ECC.2019.8795849"},{"key":"348_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.automatica.2015.11.023","volume":"65","author":"D Shi","year":"2016","unstructured":"Shi D, Elliott RJ, Chen T (2016) Event-based state estimation of discrete-state hidden Markov models. Automatica 65:12\u201326","journal-title":"Automatica"},{"issue":"12","key":"348_CR27","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1109\/TAC.2007.910713","volume":"52","author":"S Shu","year":"2007","unstructured":"Shu S, Lin F, Ying H (2007) Detectability of discrete event systems. IEEE Trans Autom Control 52(12):2356\u20132359","journal-title":"IEEE Trans Autom Control"},{"key":"348_CR28","doi-asserted-by":"publisher","first-page":"3054","DOI":"10.1016\/j.automatica.2008.05.025","volume":"44","author":"S Shu","year":"2008","unstructured":"Shu S, Lin F, Ying H, Chenc X (2008) State estimation and detectability of probabilistic discrete event systems. Automatica 44:3054\u20133060","journal-title":"Automatica"},{"key":"348_CR29","doi-asserted-by":"crossref","unstructured":"Shu S, Lin F (2009) Detectability of discrete event systems with dynamic event observation. In: Proc. joint 48th IEEE conference on decision and control and 28th chinese control, conference, China, pp 187\u2013192","DOI":"10.1109\/CDC.2009.5399841"},{"issue":"1","key":"348_CR30","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TASE.2012.2215959","volume":"10","author":"S Shu","year":"2013","unstructured":"Shu S, Lin F (2013) I-detectability of discrete-event systems. IEEE Trans Autom Sci Eng 10(1):187\u2013196","journal-title":"IEEE Trans Autom Sci Eng"},{"issue":"4","key":"348_CR31","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1109\/TAC.2012.2224255","volume":"58","author":"S Shu","year":"2013","unstructured":"Shu S (2013) Delayed detectability of discrete event systems. IEEE Trans Autom Control 58(4):862\u2013875","journal-title":"IEEE Trans Autom Control"},{"issue":"2","key":"348_CR32","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TASE.2012.2230443","volume":"10","author":"S Shu","year":"2013","unstructured":"Shu S, Huang Z, Lin F (2013) Online sensor activation for detectability of discrete event systems. IEEE Trans Autom Sci Eng 10(2):457\u2013461","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"348_CR33","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.automatica.2018.04.006","volume":"94","author":"R Su","year":"2018","unstructured":"Su R (2018) Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations. Automatica 94:35\u201344","journal-title":"Automatica"},{"key":"348_CR34","doi-asserted-by":"crossref","unstructured":"Teixeira A, P\u00e9rez D., Sandberg H, Johansson KH (2012) Attack models and scenarios for networked control systems. In: Proc. int. conf. on high confidence networked systems, China, pp 55\u201364","DOI":"10.1145\/2185505.2185515"},{"key":"348_CR35","doi-asserted-by":"crossref","unstructured":"Thorsley D (2010) Diagnosability of stochastic chemical kinetic systems: a discrete event systems approach. In: Proc. american control conference, USA, pp 2623\u20132630","DOI":"10.1109\/ACC.2010.5530522"},{"key":"348_CR36","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.ins.2020.04.027","volume":"529","author":"D Wang","year":"2020","unstructured":"Wang D, Wang X, Li Z (2020) State-based fault diagnosis of discrete-event systems with partially observable outputs. Inf Sci 529:87\u2013100","journal-title":"Inf Sci"},{"key":"348_CR37","doi-asserted-by":"crossref","unstructured":"Zhang Q, Li Z, Seatzu C, Giua A (2018) Stealthy attacks for partially-observed discrete event systems. In: Proc. IEEE 23rd international conference on emerging technologies and factory automation, Italy, pp 1161\u20131164","DOI":"10.1109\/ETFA.2018.8502501"},{"key":"348_CR38","doi-asserted-by":"crossref","unstructured":"Zhang K, Giua A (2019) K-delayed strong detectability of discrete-event systems. In: Proc. IEEE 58th conference on decision and control, France, pp 7647\u20137652","DOI":"10.1109\/CDC40024.2019.9028873"},{"issue":"1","key":"348_CR39","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TAC.2018.2843723","volume":"64","author":"P Zhao","year":"2019","unstructured":"Zhao P, Shu S, Lin F, Zhang B (2019) Detectability measure for state estimation of discrete event systems. IEEE Trans Autom Control 64 (1):433\u2013439","journal-title":"IEEE Trans Autom Control"},{"key":"348_CR40","doi-asserted-by":"crossref","unstructured":"Zhou L, Shu S, Lin F (2020) Detectability of discrete-event systems under nondeterministic Oobservations. IEEE Trans Autom Sci Eng :1\u201313","DOI":"10.1109\/ICCA51439.2020.9264344"}],"updated-by":[{"DOI":"10.1007\/s10626-022-00364-6","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000}}],"container-title":["Discrete Event Dynamic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-021-00348-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10626-021-00348-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-021-00348-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T07:38:34Z","timestamp":1655710714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10626-021-00348-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,8]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["348"],"URL":"https:\/\/doi.org\/10.1007\/s10626-021-00348-y","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10626-022-00364-6","asserted-by":"object"}]},"ISSN":["0924-6703","1573-7594"],"issn-type":[{"value":"0924-6703","type":"print"},{"value":"1573-7594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,8]]},"assertion":[{"value":"10 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10626-022-00364-6","URL":"https:\/\/doi.org\/10.1007\/s10626-022-00364-6","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}