{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T14:56:03Z","timestamp":1777388163940,"version":"3.51.4"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T00:00:00Z","timestamp":1536364800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T00:00:00Z","timestamp":1536364800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1136174"],"award-info":[{"award-number":["1136174"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2710"],"award-info":[{"award-number":["N00014-16-1-2710"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"name":"JSPS KAKENHI"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s13235-018-0285-3","type":"journal-article","created":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T02:12:25Z","timestamp":1536372745000},"page":"965-983","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["Supervisory Control of Discrete-Event Systems Under Attacks"],"prefix":"10.1007","volume":"9","author":[{"given":"Masashi","family":"Wakaiki","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Tabuada","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2809-4718","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Hespanha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,8]]},"reference":[{"key":"285_CR1","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TCST.2012.2211873","volume":"21","author":"S Amin","year":"2013","unstructured":"Amin S, Litrico X, Sastry S, Bayen AM (2013) Cyber security of water SCADA systems-part I: analysis and experimentation of stealthy deception attacks. IEEE Trans Control Syst Technol 21:1963\u20131970","journal-title":"IEEE Trans Control Syst Technol"},{"key":"285_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68612-7","volume-title":"Introduction to discrete event systems","author":"CG Cassandras","year":"2008","unstructured":"Cassandras CG, Lafortune S (2008) Introduction to discrete event systems, 2nd edn. Springer, Berlin","edition":"2"},{"key":"285_CR3","doi-asserted-by":"crossref","unstructured":"Chong MS, Wakaiki M, Hespanha JP (2015) Observability of linear systems under adversarial attacks. In: Proceedings of the 2015 American control conference","DOI":"10.1109\/ACC.2015.7171098"},{"key":"285_CR4","unstructured":"Corporation TM (2018) Common vulnerabilities and exposures (CVE) list. \nhttps:\/\/cve.mitre.org\n\n. Accessed 1 Oct 2017"},{"key":"285_CR5","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TAC.2010.2042008","volume":"55","author":"J Dubreil","year":"2010","unstructured":"Dubreil J, Darondeau P, Marchand H (2010) Supervisory control for opacity. IEEE Trans Autom Control 55:1089\u20131100","journal-title":"IEEE Trans Autom Control"},{"key":"285_CR6","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","volume":"59","author":"H Fawzi","year":"2014","unstructured":"Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59:1454\u20131467","journal-title":"IEEE Trans Autom Control"},{"key":"285_CR7","doi-asserted-by":"crossref","unstructured":"Feng L, Wonham W (2006) TCT: a computation tool for supervisory control synthesis. In: 8th international workshop on discrete event systems, pp 388\u2013389","DOI":"10.1109\/WODES.2006.382399"},{"key":"285_CR8","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.isatra.2010.08.003","volume":"50","author":"N Hubballi","year":"2011","unstructured":"Hubballi N, Biswas S, Roopa S, Ratti R, Nandi S (2011) LAN attack detection using discrete event systems. ISA Trans 50:119\u2013130","journal-title":"ISA Trans"},{"key":"285_CR9","doi-asserted-by":"crossref","unstructured":"Ji Y, Lee S, Downing E, Wang W, Fazzini M, Kim T, Orso A, Lee W (2017) Rain: refinable attack investigation with on-demand inter-process information flow tracking. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, pp 377\u2013390","DOI":"10.1145\/3133956.3134045"},{"key":"285_CR10","unstructured":"Lafortune S, Ricker L (2014) Desuma2. \nhttps:\/\/wiki.eecs.umich.edu\/desuma\/\n\n. Accessed 1 Oct 2017"},{"key":"285_CR11","doi-asserted-by":"publisher","first-page":"1848","DOI":"10.1109\/9.250564","volume":"38","author":"F Lin","year":"1993","unstructured":"Lin F (1993) Robust and adaptive supervisory control of discrete event systems. IEEE Trans Automt Control 38:1848\u20131852","journal-title":"IEEE Trans Automt Control"},{"key":"285_CR12","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.automatica.2011.01.007","volume":"47","author":"A Paoli","year":"2011","unstructured":"Paoli A, Sartini M, Lafortune S (2011) Active fault tolerant control of discrete event systems using online diagnostics. Automatica 47:639\u2013649","journal-title":"Automatica"},{"key":"285_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/5.21072","volume":"77","author":"PJ Ramadge","year":"1989","unstructured":"Ramadge PJ, Wonham WM (1989) The control of discrete event systems. Proc IEEE 77:81\u201398","journal-title":"Proc IEEE"},{"key":"285_CR14","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1109\/TAC.2011.2170453","volume":"57","author":"A Saboori","year":"2012","unstructured":"Saboori A, Hadjicostis CN (2012) Opacity-enforcing supervisory strategies via state estimator constructions. IEEE Trans Autom Control 57:1155\u20131165","journal-title":"IEEE Trans Autom Control"},{"key":"285_CR15","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1016\/j.sysconle.2006.04.003","volume":"55","author":"A Saboori","year":"2006","unstructured":"Saboori A, Zad SH (2006) Robust nonblocking supervisory control of discrete-event systems under partial observation. Syst Control Lett 55:839\u2013848","journal-title":"Syst Control Lett"},{"key":"285_CR16","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10626-006-0022-8","volume":"16","author":"AM S\u00e1nchez","year":"2006","unstructured":"S\u00e1nchez AM, Montoya FJ (2006) Safe supervisory control under observability failure. Discrete Event Dyn Syst Theory Appl 16:493\u2013525","journal-title":"Discrete Event Dyn Syst Theory Appl"},{"key":"285_CR17","doi-asserted-by":"crossref","unstructured":"Sheyner O, Wing J (2004) Tools for generating and analyzing attack graphs. In: de Boer FS, Bonsangue MM, Graf S, de Roever WP (eds) Formal methods for components and objects: second international symposium, FMCO 2003, Leiden, The Netherlands, November 4\u20137, 2003. Revised Lectures, no. 3188 in Lecture Notes on Computer Science. Springer, Berlin, pp. 344\u2013371","DOI":"10.1007\/978-3-540-30101-1_17"},{"issue":"8","key":"285_CR18","doi-asserted-by":"publisher","first-page":"2079","DOI":"10.1109\/TAC.2015.2492159","volume":"61","author":"Y Shoukry","year":"2016","unstructured":"Shoukry Y, Tabuada P (2016) Event-triggered state observers for sparse noise\/attacks. IEEE Trans Autom Control 61(8):2079\u20132091","journal-title":"IEEE Trans Autom Control"},{"key":"285_CR19","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/TASE.2013.2264809","volume":"11","author":"S Shu","year":"2014","unstructured":"Shu S, Lin F (2014) Fault-tolerant control for safety of discrete-event systems. IEEE Trans Autom Sci Eng 11:78\u201389","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"285_CR20","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/S0167-6911(99)00105-X","volume":"39","author":"S Takai","year":"2000","unstructured":"Takai S (2000) Robust supervisory control of a class of timed discrete event systems under partial observation. Syst Control Lett 39:267\u2013273","journal-title":"Syst Control Lett"},{"key":"285_CR21","doi-asserted-by":"publisher","first-page":"307","DOI":"10.9746\/jcmsi.1.307","volume":"1","author":"S Takai","year":"2008","unstructured":"Takai S, Oka Y (2008) A formula for the supremal controllable and opaque sublanguage arising in supervisory control. SICE J Control Meas Syst Integr 1:307\u2013311","journal-title":"SICE J Control Meas Syst Integr"},{"key":"285_CR22","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.automatica.2014.10.067","volume":"51","author":"A Teixeira","year":"2015","unstructured":"Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51:135\u2013148","journal-title":"Automatica"},{"key":"285_CR23","doi-asserted-by":"crossref","unstructured":"Thorsley D, Teneketzis D (2006) Intrusion detection in controlled discrete event systems. In: Proceedings\u00a0of the 45th conference on decision and control","DOI":"10.1109\/CDC.2006.377810"},{"key":"285_CR24","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/BF02551817","volume":"2","author":"JN Tsitsiklis","year":"1989","unstructured":"Tsitsiklis JN (1989) On the control of discrete-event dynamical systems. Math Control Signals Syst 2:96\u2013107","journal-title":"Math Control Signals Syst"},{"key":"285_CR25","doi-asserted-by":"crossref","unstructured":"Ushio T, Takai S (2009) Supervisory control of discrete event systems modeled by Mealy automata with nondeterministic output functions. In: Proceedings of the 2009 American control conference","DOI":"10.1109\/ACC.2009.5159823"},{"issue":"3","key":"285_CR26","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TAC.2015.2449051","volume":"61","author":"T Ushio","year":"2016","unstructured":"Ushio T, Takai S (2016) Nonblocking supervisory control of discrete event systems modeled by Mealy automata with nondeterministic output functions. IEEE Trans Autom Control 61(3):799\u2013804","journal-title":"IEEE Trans Autom Control"},{"key":"285_CR27","doi-asserted-by":"crossref","unstructured":"Whittaker SJ, Zulkernine M, Rudie K (2008) Toward incorporating discrete-event systems in secure software development. In: Proceedings of ARES\u201908","DOI":"10.1109\/ARES.2008.70"},{"key":"285_CR28","unstructured":"Wonham WM (2010) Supervisory control of discrete-event systems. \nhttp:\/\/www.se.wtb.tue.nl\/_media\/wonham\/wonham_scdes2010.pdf\n\n. Accessed 1 Oct 2017"},{"key":"285_CR29","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1016\/j.automatica.2014.02.038","volume":"50","author":"YC Wu","year":"2014","unstructured":"Wu YC, Lafortune S (2014) Synthesis of insertion functions for enforcement of opacity security properties. Automatica 50:1336\u20131348","journal-title":"Automatica"},{"key":"285_CR30","doi-asserted-by":"crossref","unstructured":"Xu S, Kumar R (2009) Discrete event control under nondeterministic partial observation. In: Proceedings of IEEE CASE\u201909","DOI":"10.1109\/COASE.2009.5234123"},{"issue":"5","key":"285_CR31","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1109\/TAC.2016.2601118","volume":"62","author":"X Yin","year":"2017","unstructured":"Yin X (2017) Supervisor synthesis for Mealy automata with output functions: a model transformation approach. IEEE Trans Autom Control 62(5):2576\u20132581","journal-title":"IEEE Trans Autom Control"},{"key":"285_CR32","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1023\/A:1015625600613","volume":"12","author":"TS Yoo","year":"2002","unstructured":"Yoo TS, Lafortune S (2002) A general architecture for decentralized supervisory control of discrete-event systems. Discrete Event Dyn Syst Theory Appl 12:335\u2013377","journal-title":"Discrete Event Dyn Syst Theory Appl"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-0285-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13235-018-0285-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-0285-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T18:27:46Z","timestamp":1589740066000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13235-018-0285-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,8]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["285"],"URL":"https:\/\/doi.org\/10.1007\/s13235-018-0285-3","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"value":"2153-0785","type":"print"},{"value":"2153-0793","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,8]]},"assertion":[{"value":"8 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}