{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:13:17Z","timestamp":1768338797742,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T00:00:00Z","timestamp":1646784000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T00:00:00Z","timestamp":1646784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001459","name":"Ministry of Education - Singapore","doi-asserted-by":"publisher","award":["2018-T1-001-245 (RG91\/18)"],"award-info":[{"award-number":["2018-T1-001-245 (RG91\/18)"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discrete Event Dyn Syst"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s10626-021-00356-y","type":"journal-article","created":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T10:02:49Z","timestamp":1646820169000},"page":"495-520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Observation-assisted heuristic synthesis of covert attackers against unknown supervisors"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8363-584X","authenticated-orcid":false,"given":"Liyong","family":"Lin","sequence":"first","affiliation":[]},{"given":"Ruochen","family":"Tai","sequence":"additional","affiliation":[]},{"given":"Yuting","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,9]]},"reference":[{"issue":"6","key":"356_CR1","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1051\/ita\/1993270605551","volume":"27","author":"A Bergeron","year":"1993","unstructured":"Bergeron A (1993) A unified approach to control problems in discrete event processes. RAIRO-Theoret Inform Appl 27(6):555\u2013573","journal-title":"RAIRO-Theoret Inform Appl"},{"key":"356_CR2","doi-asserted-by":"crossref","unstructured":"Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. Int Workshop Discrete Event Syst 298\u2013305","DOI":"10.1109\/WODES.2016.7497863"},{"key":"356_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.automatica.2018.07.017","volume":"97","author":"LK Carvalho","year":"2018","unstructured":"Carvalho LK, Wu YC, Kwong R, Lafortune S (2018) Detection and mitigation of classes of attacks in supervisory control systems. Automatica 97:121\u2013133","journal-title":"Automatica"},{"key":"356_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4070-7","volume-title":"Introduction to discrete event systems","author":"C Cassandras","year":"1999","unstructured":"Cassandras C, Lafortune S (1999) Introduction to discrete event systems. Kluwer, Boston"},{"key":"356_CR5","doi-asserted-by":"crossref","unstructured":"Feng L, Wonham WM (2006) Tct: a computation tool for supervisory control synthesis. Workshop Discrete Event Syst 388\u2013389","DOI":"10.1109\/WODES.2006.382399"},{"key":"356_CR6","volume-title":"Languages, and computation","author":"JE Hopcroft","year":"1979","unstructured":"Hopcroft JE, Ullman JD, theory Introduction to automata (1979) Languages, and computation. Addison-Wesley, Reading, Massachusetts"},{"key":"356_CR7","doi-asserted-by":"crossref","unstructured":"Khoumsi A (2019) Sensor and actuator attacks of cyber-physical systems: a study based on supervisory control of discrete event systems. Conf Syst Control 176\u2013182","DOI":"10.1109\/ICSC47195.2019.8950627"},{"issue":"1","key":"356_CR8","first-page":"12333","volume":"50","author":"PM Lima","year":"2017","unstructured":"Lima PM, Alves MVS, Carvalho LK, Moreira MV (2017) Security against network attacks in supervisory control systems. IFAC 50(1):12333\u201312338","journal-title":"IFAC"},{"issue":"7","key":"356_CR9","first-page":"179","volume":"51","author":"PM Lima","year":"2018","unstructured":"Lima PM, Carvalho LK, Moreira MV (2018) Detectable and undetectable network attack security of cyber-physical systems. IFAC 51(7):179\u2013185","journal-title":"IFAC"},{"key":"356_CR10","unstructured":"Lin L (2015) Towards decentralized and parameterized supervisor synthesis, Ph.D thesis, School of Electrical and Electronic Engineering, Nanyang Technological Unversity. [Online] Available: https:\/\/dr.ntu.edu.sg\/handle\/10356\/65641"},{"key":"356_CR11","doi-asserted-by":"crossref","unstructured":"Lin L, Su R (2020) Bounded synthesis of resilient supervisors. IEEE Transactions on Automatic Control under review","DOI":"10.1109\/CDC40024.2019.9030171"},{"key":"356_CR12","doi-asserted-by":"crossref","unstructured":"Lin L, Su R (2020) Synthesis of covert actuator and sensor attackers as supervisor synthesis. Workshop on Discrete Event Systems 1\u20136","DOI":"10.1016\/j.ifacol.2021.04.047"},{"key":"356_CR13","doi-asserted-by":"publisher","first-page":"109714","DOI":"10.1016\/j.automatica.2021.109714","volume":"130","author":"L Lin","year":"2021","unstructured":"Lin L, Su R (2021) Synthesis of covert actuator and sensor attackers. Automatica, vol 130:109714","journal-title":"Automatica, vol"},{"key":"356_CR14","doi-asserted-by":"crossref","unstructured":"Lin L, Thuijsman S, Zhu Y, Ware S, Su R, Reniers M (2019) Synthesis of successful actuator attackers on supervisors. American Control Conf 5614\u20135619","DOI":"10.23919\/ACC.2019.8814712"},{"key":"356_CR15","doi-asserted-by":"crossref","unstructured":"Lin L, Zhu Y, Su R (2019) Towards bounded synthesis of resilient supervisors. Conf Dec Control 7659\u20137664","DOI":"10.1109\/CDC40024.2019.9030171"},{"key":"356_CR16","doi-asserted-by":"publisher","unstructured":"Lin L, Zhu Y, Su R (2020) Synthesis of covert actuator attackers for free, Discrete Event Dynamic Systems:Theory and Applications, https:\/\/doi.org\/10.1007\/s10626-020-00312-2","DOI":"10.1007\/s10626-020-00312-2"},{"key":"356_CR17","unstructured":"Lin L, Zhu Y, Tai R, Ware S, Su R (2020) Networked supervisor synthesis against lossy channels with bounded network delays as non-networked synthesis, Automatica under review"},{"key":"356_CR18","doi-asserted-by":"crossref","unstructured":"Lin L, Tai R, Zhu Y, Su R (2021) Heuristic synthesis of covert attackers against unknown supervisors. Conference on Decision and Control accepted","DOI":"10.1007\/s10626-021-00356-y"},{"key":"356_CR19","doi-asserted-by":"publisher","first-page":"5794","DOI":"10.1016\/j.ifacol.2017.08.427","volume":"50","author":"R Malik","year":"2017","unstructured":"Malik R, Akesson K, Flordal H, Fabian M (2017) Supremica\u2013an efficient tool for large-scale discrete event systems. IFAC-PapersOnLine 50:5794\u20135799","journal-title":"IFAC-PapersOnLine"},{"key":"356_CR20","doi-asserted-by":"crossref","unstructured":"Meira-Goes R, Marchand H (2019) S. Lafortune Towards resilient supervisors against sensor deception attacks. Conf Dec Control 5144\u20135149","DOI":"10.1109\/CDC40024.2019.9029737"},{"key":"356_CR21","doi-asserted-by":"crossref","unstructured":"Meira-Goes R, Kang E, Kwong R, Lafortune S (2017) Stealthy deception attacks for cyber-physical systems. Conf Decision Control 4224\u20134230","DOI":"10.1109\/CDC.2017.8264281"},{"key":"356_CR22","doi-asserted-by":"publisher","first-page":"109172","DOI":"10.1016\/j.automatica.2020.109172","volume":"121","author":"R Meira-Goes","year":"2020","unstructured":"Meira-Goes R, Kang E, Kwong R, Lafortune S (2020) Synthesis of sensor deception attacks at the supervisory layer of cyber\u2013physical systems. Automatica 121:109172","journal-title":"Automatica"},{"key":"356_CR23","doi-asserted-by":"crossref","unstructured":"Mohajerani S, Meira-Goes R, Lafortune S (2020) Efficient synthesis of sensor deception attacks using observation equivalence-based abstraction. Workshop Discrete Event Syst 28\u201334","DOI":"10.1016\/j.ifacol.2021.04.069"},{"key":"356_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.automatica.2018.04.006","volume":"94","author":"R Su","year":"2018","unstructured":"Su R (2018) Supervisor synthesis to thwart cyber-attack with bounded sensor reading alterations. Automatica 94:35\u201344","journal-title":"Automatica"},{"key":"356_CR25","unstructured":"Su R (2020) On decidability of existence of nonblocking supervisors resilient to smart sensor attacks. arXiv:2009.02626v1"},{"key":"356_CR26","unstructured":"SuSyNA (2011) Supervisor synthesis for non-deterministic automata. [Online]. Available:https:\/\/www.ntu.edu.sg\/home\/rsu\/Downloads.htm"},{"key":"356_CR27","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1007\/s13235-018-0285-3","volume":"9","author":"M Wakaiki","year":"2019","unstructured":"Wakaiki M, Tabuada P, Hespanha JP (2019) Supervisory control of discrete-event systems under attacks. Dynamic Games Appl 9:965\u2013983","journal-title":"Dynamic Games Appl"},{"key":"356_CR28","doi-asserted-by":"crossref","unstructured":"Wang Y, Pajic M (2019) Supervisory control of discrete event systems in the presence of sensor and actuator attacks. Conf Decision Control 5350\u20135355","DOI":"10.1109\/CDC40024.2019.9029767"},{"key":"356_CR29","doi-asserted-by":"crossref","unstructured":"Wang Y, Pajic M (2019) Attack-resilient supervisory control with intermittently secure communication. Conf Dec Control 2015\u20132020","DOI":"10.1109\/CDC40024.2019.9029366"},{"issue":"1","key":"356_CR30","doi-asserted-by":"publisher","first-page":"42084","DOI":"10.1109\/ACCESS.2018.2859798","volume":"6","author":"D Wang","year":"2018","unstructured":"Wang D, Lin L, Li Z, Wonham WM (2018) State-based control of discrete-event systems under partial observation. IEEE Access 6(1):42084\u201342093","journal-title":"IEEE Access"},{"key":"356_CR31","volume-title":"Supervisory control of discrete-event systems, Monograph Series Communications and Control Engineering","author":"WM Wonham","year":"2018","unstructured":"Wonham WM, Cai K (2018) Supervisory control of discrete-event systems, Monograph Series Communications and Control Engineering. Springer, Berlin"},{"issue":"5","key":"356_CR32","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/TAC.2015.2460391","volume":"61","author":"X Yin","year":"2016","unstructured":"Yin X, Lafortune S (2016) Synthesis of maximally permissive supervisors for partially observed discrete event systems. IEEE Trans Autom Control 61 (5):1239\u20131254","journal-title":"IEEE Trans Autom Control"},{"key":"356_CR33","doi-asserted-by":"crossref","unstructured":"Zhu Y, Lin L, Su R (2019) Supervisor obfuscation against actuator enablement attack. Europ Control Conf 1760\u20131765","DOI":"10.23919\/ECC.2019.8795844"},{"key":"356_CR34","doi-asserted-by":"crossref","unstructured":"Zhu Y, Lin L, Ware S, Su R (2019) Supervisor synthesis for networked discrete event systems with communication delays and lossy events. Conf Decision Control 6730\u20136735","DOI":"10.1109\/CDC40024.2019.9029888"}],"container-title":["Discrete Event Dynamic Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-021-00356-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10626-021-00356-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10626-021-00356-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,9]],"date-time":"2022-09-09T13:29:44Z","timestamp":1662730184000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10626-021-00356-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,9]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["356"],"URL":"https:\/\/doi.org\/10.1007\/s10626-021-00356-y","relation":{},"ISSN":["0924-6703","1573-7594"],"issn-type":[{"value":"0924-6703","type":"print"},{"value":"1573-7594","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,9]]},"assertion":[{"value":"28 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}