{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:44:16Z","timestamp":1768722256592,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11424-025-4348-4","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:06:36Z","timestamp":1742400396000},"page":"150-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detectability of Discrete Event Systems Under Sensor Attacks"],"prefix":"10.1007","volume":"38","author":[{"given":"K.","family":"Ritsuka","sequence":"first","affiliation":[]},{"given":"Feng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Lafortune","sequence":"additional","affiliation":[]},{"given":"Caisheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,19]]},"reference":[{"issue":"1","key":"4348_CR1","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCS.2014.2364708","volume":"35","author":"H Sandberg","year":"2015","unstructured":"Sandberg H, Amin S, and Johansson K H, Cyberphysical security in networked control systems: An introduction to the issue, IEEE Control Systems, 2015, 35(1): 20\u201323.","journal-title":"IEEE Control Systems"},{"issue":"1","key":"4348_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCNS.2017.2667233","volume":"4","author":"P Cheng","year":"2017","unstructured":"Cheng P, Shi L, and Sinopoli B, Guest editorial special issue on secure control of cyber-physical systems, IEEE Transactions on Control of Network Systems, 2017, 4(1): 1\u20133.","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"4348_CR3","doi-asserted-by":"publisher","first-page":"101677","DOI":"10.1016\/j.cose.2019.101677","volume":"89","author":"D Bhamare","year":"2020","unstructured":"Bhamare D, Zolanvari M, Erbad A, et al., Cybersecurity for industrial control systems: A survey, Computers & Security, 2020, 89: 101677.","journal-title":"Computers & Security"},{"key":"4348_CR4","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1007\/s13235-018-0285-3","volume":"9","author":"M Wakaiki","year":"2019","unstructured":"Wakaiki M, Tabuada P, and Hespanha J, Supervisory control of discrete-event systems under attacks, Dynamic Games and Applications, 2019, 9: 965\u2013983.","journal-title":"Dynamic Games and Applications"},{"issue":"4","key":"4348_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1561\/2600000024","volume":"8","author":"J C Basilio","year":"2021","unstructured":"Basilio J C, Hadjicostis C N, and Su R, Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security, Foundations and Trends in Systems and Control, 2021, 8(4): 285\u2013443.","journal-title":"Foundations and Trends in Systems and Control"},{"key":"4348_CR6","first-page":"1","volume-title":"IEEE International Conference on Automation, Control and Robotics Engineering (CACRE 2021)","author":"S B Zheng","year":"2021","unstructured":"Zheng S B, Shu S L, and Lin F, Modeling and control of discrete event systems under joint sensor-actuator cyber attacks, IEEE International Conference on Automation, Control and Robotics Engineering (CACRE 2021), 2021, 1\u20138."},{"key":"4348_CR7","first-page":"4839","volume-title":"IEEE 61st Conference on Decision and Control (CDC)","author":"J S Yao","year":"2022","unstructured":"Yao J S, Yin X, and Li S Y, Sensor deception attacks against initial-state privacy in supervisory control systems, IEEE 61st Conference on Decision and Control (CDC), 2022, 4839\u20134845."},{"key":"4348_CR8","first-page":"3020","volume-title":"IEEE 61st Conference on Decision and Control (CDC)","author":"C N Hadjicostis","year":"2022","unstructured":"Hadjicostis C N., Lafortune S, Lin F, et al., Cybersecurity and supervisory control: A tutorial on robust state estimation, attack synthesis, and resilient control, IEEE 61st Conference on Decision and Control (CDC), 2022, 3020\u20133040."},{"issue":"2","key":"4348_CR9","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1016\/j.ifacol.2023.10.1516","volume":"56","author":"F Lin","year":"2023","unstructured":"Lin F, Lafortune S, and Wang C S, Diagnosability of discrete event systems under sensor attacks, IFAC-PapersOnLine, 2023, 56(2): 3572\u20133578.","journal-title":"IFAC-PapersOnLine"},{"key":"4348_CR10","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10626-024-00401-6","volume":"34","author":"F Lin","year":"2024","unstructured":"Lin F, Lafortune S, and Wang C S, Diagnosability and attack detection for discrete event systems under sensor attacks, Discrete Event Dynamic Systems, 2024, 34: 465\u2013495.","journal-title":"Discrete Event Dynamic Systems"},{"issue":"5","key":"4348_CR11","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.sysconle.2011.02.001","volume":"60","author":"S L Shu","year":"2011","unstructured":"Shu S L and Lin F, Generalized detectability for discrete event systems, Systems & Control Letters, 2011, 60(5): 310\u2013317.","journal-title":"Systems & Control Letters"},{"issue":"2","key":"4348_CR12","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TCNS.2023.3312249","volume":"11","author":"S B Zheng","year":"2024","unstructured":"Zheng S B, Shu S L, and Lin F, Modeling and control of discrete-event systems under joint sensor-actuator cyberattacks, IEEE Transactions on Control of Network Systems, 2024, 11(2): 782\u2013794.","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"4348_CR13","first-page":"1108","volume-title":"25th IEEE Conference on Decision and Control","author":"P Ramadge","year":"1986","unstructured":"Ramadge P, Observability of discrete event systems, 25th IEEE Conference on Decision and Control, 1986, 1108\u20131112."},{"issue":"3","key":"4348_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/0020-0255(88)90001-1","volume":"44","author":"F Lin","year":"1988","unstructured":"Lin F and Wonham W M, On observability of discrete-event systems, Information Sciences, 1988, 44(3): 173\u2013198.","journal-title":"Information Sciences"},{"key":"4348_CR15","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/CDC.1988.194300","volume-title":"27th IEEE Conference on Decision and Control","author":"P E Caines","year":"1988","unstructured":"Caines P E, Greiner R, and Wang S, Dynamical logic observers for finite automata, 27th IEEE Conference on Decision and Control, 1988, 226\u2013233."},{"issue":"3","key":"4348_CR16","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/9.402","volume":"33","author":"R Cieslak","year":"1988","unstructured":"Cieslak R, Desclaux C, Fawaz A S, et al., Supervisory control of discrete-event processes with partial observations, IEEE Transactions on Automatic Control, 1988, 33(3): 249\u2013260.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"7","key":"4348_CR17","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/9.57018","volume":"35","author":"C M Ozveren","year":"1990","unstructured":"Ozveren C M and Willsky A S, Observability of discrete event dynamic systems, IEEE Transactions on Automatic Control, 1990, 35(7): 797\u2013806.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"1","key":"4348_CR18","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1093\/imamci\/8.1.45","volume":"8","author":"P E Caines","year":"1991","unstructured":"Caines P E, Greiner R, and Wang S N, Classical and logic-based dynamic observers for finite automata, IMA Journal of Mathematical Control and Information, 1991, 8(1): 45\u201380.","journal-title":"IMA Journal of Mathematical Control and Information"},{"issue":"12","key":"4348_CR19","doi-asserted-by":"publisher","first-page":"2356","DOI":"10.1109\/TAC.2007.910713","volume":"52","author":"S L Shu","year":"2007","unstructured":"Shu S L, Lin F, and Ying H, Detectability of discrete event systems, IEEE Transactions on Automatic Control, 2007, 52(12): 2356\u20132359.","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"11","key":"4348_CR20","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSMC.1976.4309444","volume":"SMC-6","author":"W M Wonham","year":"1976","unstructured":"Wonham W M, Towards an abstract internal model principle, IEEE Transactions on Systems, Man, and Cybernetics, 1976, SMC-6(11): 735\u2013740.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"4348_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30821-6","volume-title":"Estimation and Inference in Discrete Event Systems a Model-Based Approach with Finite Automata","author":"C N Hadjicostis","year":"2020","unstructured":"Hadjicostis C N, Estimation and Inference in Discrete Event Systems a Model-Based Approach with Finite Automata, Springer International Publishing AG, Berlin, 2020."},{"key":"4348_CR22","doi-asserted-by":"publisher","first-page":"100902","DOI":"10.1016\/j.arcontrol.2023.100902","volume":"56","author":"K Z Zhang","year":"2023","unstructured":"Zhang K Z, A unified concurrent-composition method to state\/event inference and concealment in labeled finite-state automata as discrete-event systems, Annual Reviews in Control, 2023, 56: 100902.","journal-title":"Annual Reviews in Control"},{"key":"4348_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.sysconle.2018.07.008","volume":"119","author":"X Yin","year":"2018","unstructured":"Yin X, Li Z J, and Wang W L, Trajectory detectability of discrete-event systems, Systems & Control Letters, 2018, 119: 101\u2013107.","journal-title":"Systems & Control Letters"},{"key":"4348_CR24","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.automatica.2018.03.077","volume":"93","author":"T Masopust","year":"2018","unstructured":"Masopust T, Complexity of deciding detectability in discrete event systems, Automatica, 2018, 93: 257\u2013261.","journal-title":"Automatica"},{"issue":"3","key":"4348_CR25","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10626-020-00311-3","volume":"30","author":"K Z Zhang","year":"2020","unstructured":"Zhang K Z and Giua A, On detectability of labeled petri nets and finite automata, Discrete Event Dynamic Systems, 2020, 30(3): 465\u2013497.","journal-title":"Discrete Event Dynamic Systems"},{"key":"4348_CR26","doi-asserted-by":"publisher","first-page":"7647","DOI":"10.1109\/CDC40024.2019.9028873","volume-title":"2019 IEEE 58th Conference on Decision and Control (CDC)","author":"K Z Zhang","year":"2019","unstructured":"Zhang K Z and Giua A, K-delayed strong detectability of discrete-event systems, 2019 IEEE 58th Conference on Decision and Control (CDC), 2019, 7647\u20137652."},{"key":"4348_CR27","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.automatica.2018.12.019","volume":"101","author":"T Masopust","year":"2019","unstructured":"Masopust T and Yin X, Complexity of detectability, opacity and a-diagnosability for modular discrete event systems, Automatica, 2019, 101: 290\u2013295.","journal-title":"Automatica"},{"key":"4348_CR28","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.automatica.2019.02.058","volume":"104","author":"T Masopust","year":"2019","unstructured":"Masopust T and Yin X, Deciding detectability for labeled petri nets, Automatica, 2019, 104: 238\u2013241.","journal-title":"Automatica"},{"key":"4348_CR29","first-page":"1","volume-title":"IEEE Transactions on Automation Science and Engineering","author":"M V S Alves","year":"2024","unstructured":"Alves M V S and Basilio J C, State estimation and detectability of networked discrete event systems with multi-channel communication networks, IEEE Transactions on Automation Science and Engineering, 2024, 1\u201316."},{"key":"4348_CR30","doi-asserted-by":"publisher","first-page":"3728","DOI":"10.23919\/ACC53348.2022.9867776","volume-title":"American Control Conference (ACC)","author":"K Z Zhang","year":"2022","unstructured":"Zhang K Z, How attacks affect detectability in discrete-event systems?, American Control Conference (ACC), IEEE, 2022, 3728\u20133733."},{"key":"4348_CR31","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.13900231","volume-title":"Supplementary material for \u201cDetectability of discrete event systems under sensor attacks\u201d","author":"K Ritsuka","year":"2024","unstructured":"Ritsuka K, Lafortune S, and Lin F, Supplementary material for \u201cDetectability of discrete event systems under sensor attacks\u201d, Zenodo, 2024, DOI: https:\/\/doi.org\/10.5281\/zenodo.13900231."},{"key":"4348_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72274-6","volume-title":"Introduction to Discrete Event Systems","author":"C G Cassandras","year":"2021","unstructured":"Cassandras C G and Lafortune S, Introduction to Discrete Event Systems, 3rd Edition, Springer, Cham, 2021.","edition":"3rd Edition"},{"key":"4348_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77452-7","volume-title":"Supervisory Control of Discrete-Event Systems","author":"W M Wonham","year":"2019","unstructured":"Wonham W M and Cai K, Supervisory Control of Discrete-Event Systems, Springer, New York, 2019."},{"issue":"9","key":"4348_CR34","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1109\/9.412626","volume":"40","author":"M Sampath","year":"1995","unstructured":"Sampath M, Sengupta R, Lafortune S, et al., Diagnosability of discrete-event systems, IEEE Transactions on Automatic Control, 1995, 40(9): 1555\u20131575.","journal-title":"IEEE Transactions on Automatic Control"},{"key":"4348_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1844-9","volume-title":"Automata and Computability","author":"D C Kozen","year":"1997","unstructured":"Kozen D C, Automata and Computability, Springer, New York, 1997."},{"issue":"2","key":"4348_CR36","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10626-017-0264-7","volume":"28","author":"Y Tong","year":"2017","unstructured":"Tong Y, Li Z W, Seatzu C, et al., Current-state opacity enforcement in discrete event systems under incomparable observations, Discrete Event Dynamic Systems, 2017, 28(2): 161\u2013182.","journal-title":"Discrete Event Dynamic Systems"}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-025-4348-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-025-4348-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-025-4348-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:06:41Z","timestamp":1742400401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-025-4348-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4348"],"URL":"https:\/\/doi.org\/10.1007\/s11424-025-4348-4","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"23 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}