{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:02Z","timestamp":1750306202867,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T00:00:00Z","timestamp":1476835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,19]]},"DOI":"10.1145\/2997465.2997478","type":"proceedings-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T15:58:54Z","timestamp":1476979134000},"page":"141-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Intrusion-Damage Assessment and Mitigation in Cyber-Physical Systems for Control Applications"],"prefix":"10.1145","author":[{"given":"Rouhollah","family":"Mahfouzi","sequence":"first","affiliation":[{"name":"Embedded Systems Laboratory, Link\u00f6ping University, Sweden"}]},{"given":"Amir","family":"Aminifar","sequence":"additional","affiliation":[{"name":"Embedded Systems Laboratory, Link\u00f6ping University, Sweden and Embedded Systems Laboratory, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland"}]},{"given":"Petru","family":"Eles","sequence":"additional","affiliation":[{"name":"Embedded Systems Laboratory, Link\u00f6ping University, Sweden"}]},{"given":"Zebo","family":"Peng","sequence":"additional","affiliation":[{"name":"Embedded Systems Laboratory, Link\u00f6ping University, Sweden"}]},{"given":"Mattias","family":"Villani","sequence":"additional","affiliation":[{"name":"Division of Statistics and Machine Learning, Link\u00f6ping University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2016,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-28428-1_6","volume-title":"Embedded Security in Cars: Securing Current and Future Automotive IT Applications","author":"Wolf M.","year":"2006","unstructured":"M. Wolf , A. Weimerskirch , and C. Paar , Embedded Security in Cars: Securing Current and Future Automotive IT Applications . Berlin, Heidelberg : Springer Berlin Heidelberg , 2006 , ch. Secure In-Vehicle Communication, pp. 95 -- 109 . M. Wolf, A. Weimerskirch, and C. Paar, Embedded Security in Cars: Securing Current and Future Automotive IT Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, ch. Secure In-Vehicle Communication, pp. 95--109."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87698-4_21"},{"volume-title":"Stuxnet and the future of cyber war","author":"Farwall P.","key":"e_1_3_2_1_4_1","unstructured":"P. Farwall and R. Rohozinski , \" Stuxnet and the future of cyber war ,\" vol. 53 , no. 1, 2011, pp. 23--40. P. Farwall and R. Rohozinski, \"Stuxnet and the future of cyber war,\" vol. 53, no. 1, 2011, pp. 23--40."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/996566.996771"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.51"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10617-008-9027-x"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2485288.2485398"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795210"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531076"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_2_1_13_1","volume-title":"Using model-based intrusion detection for scada networks,\" in Proceedings of the SCADA Security Scientific Symposium","author":"Cheung S.","year":"2007","unstructured":"S. Cheung , B. Dutertre , M. Fong , U. Lindqvist , K. Skinner , and A. Valdes , \" Using model-based intrusion detection for scada networks,\" in Proceedings of the SCADA Security Scientific Symposium , 2007 . S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, \"Using model-based intrusion detection for scada networks,\" in Proceedings of the SCADA Security Scientific Symposium, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2298195"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364725"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"e_1_3_2_1_18_1","first-page":"337","volume-title":"Secure state-estimation for dynamical systems under active adversaries,\" in 49th Annual Allerton Conference on Communication, Control, and Computing","author":"Fawzi H.","year":"2011","unstructured":"H. Fawzi , P. Tabuada , and S. Diggavi , \" Secure state-estimation for dynamical systems under active adversaries,\" in 49th Annual Allerton Conference on Communication, Control, and Computing , 2011 , pp. 337 -- 344 . H. Fawzi, P. Tabuada, and S. Diggavi, \"Secure state-estimation for dynamical systems under active adversaries,\" in 49th Annual Allerton Conference on Communication, Control, and Computing, 2011, pp. 337--344."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Automation & Test in Europe","author":"Ivanov R.","year":"2014","unstructured":"R. Ivanov , M. Pajic , and I. Lee , \" Attack-resilient sensor fusion,\" in Proceedings of the Conference on Design , Automation & Test in Europe , 2014 , pp. 54: 1 -- 54 :6. R. Ivanov, M. Pajic, and I. Lee, \"Attack-resilient sensor fusion,\" in Proceedings of the Conference on Design, Automation & Test in Europe, 2014, pp. 54:1--54:6."},{"key":"e_1_3_2_1_20_1","first-page":"3818","volume-title":"Sound and complete state estimation for linear dynamical systems under sensor attacks using satisfiability modulo theory solving,\" in American Control Conference (ACC)","author":"Shoukry Y.","year":"2015","unstructured":"Y. Shoukry , A. Puggelli , P. Nuzzo , A. Sangiovanni-Vincentelli , S. Seshia , and P. Tabuada , \" Sound and complete state estimation for linear dynamical systems under sensor attacks using satisfiability modulo theory solving,\" in American Control Conference (ACC) , 2015 , 2015, pp. 3818 -- 3823 . Y. Shoukry, A. Puggelli, P. Nuzzo, A. Sangiovanni-Vincentelli, S. Seshia, and P. Tabuada, \"Sound and complete state estimation for linear dynamical systems under sensor attacks using satisfiability modulo theory solving,\" in American Control Conference (ACC), 2015, 2015, pp. 3818--3823."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_22_1","first-page":"3412","volume-title":"Security for control systems under sensor and actuator attacks,\" in IEEE 51st Annual Conference on Decision and Control (CDC)","author":"Fawzi H.","year":"2012","unstructured":"H. Fawzi , P. Tabuada , and S. Diggavi , \" Security for control systems under sensor and actuator attacks,\" in IEEE 51st Annual Conference on Decision and Control (CDC) , 2012 , pp. 3412 -- 3417 . H. Fawzi, P. Tabuada, and S. Diggavi, \"Security for control systems under sensor and actuator attacks,\" in IEEE 51st Annual Conference on Decision and Control (CDC), 2012, pp. 3412--3417."},{"key":"e_1_3_2_1_23_1","volume-title":"Optimal thresholds for anomaly-based intrusion detection in dynamical environments,\" arXiv preprint arXiv:1606.06707","author":"Ghafouri A.","year":"2016","unstructured":"A. Ghafouri , W. Abbas , A. Laszka , Y. Vorobeychik , and X. Koutsoukos , \" Optimal thresholds for anomaly-based intrusion detection in dynamical environments,\" arXiv preprint arXiv:1606.06707 , 2016 . A. Ghafouri, W. Abbas, A. Laszka, Y. Vorobeychik, and X. Koutsoukos, \"Optimal thresholds for anomaly-based intrusion detection in dynamical environments,\" arXiv preprint arXiv:1606.06707, 2016."},{"key":"e_1_3_2_1_24_1","first-page":"13","volume-title":"On task schedulability in real-time control systems,\" in Proceedings of the 17th IEEE Real-Time Systems Symposium","author":"Seto D.","year":"1996","unstructured":"D. Seto , J. P. Lehoczky , L. Sha , and K. G. Shin , \" On task schedulability in real-time control systems,\" in Proceedings of the 17th IEEE Real-Time Systems Symposium , 1996 , pp. 13 -- 21 . D. Seto, J. P. Lehoczky, L. Sha, and K. G. Shin, \"On task schedulability in real-time control systems,\" in Proceedings of the 17th IEEE Real-Time Systems Symposium, 1996, pp. 13--21."},{"key":"e_1_3_2_1_25_1","first-page":"137","volume-title":"Integration of offline scheduling and optimal control,\" in Proceedings of the 12th Euromicro Conference on Real-Time Systems","author":"Rehbinder H.","year":"2000","unstructured":"H. Rehbinder and M. Sanfridson , \" Integration of offline scheduling and optimal control,\" in Proceedings of the 12th Euromicro Conference on Real-Time Systems , 2000 , pp. 137 -- 143 . H. Rehbinder and M. Sanfridson, \"Integration of offline scheduling and optimal control,\" in Proceedings of the 12th Euromicro Conference on Real-Time Systems, 2000, pp. 137--143."},{"key":"e_1_3_2_1_26_1","volume-title":"The jitter margin and its application in the design of real-time control systems,\" in Proceedings of the 10th International Conference on Real-Time and Embedded Computing Systems and Applications","author":"Cervin A.","year":"2004","unstructured":"A. Cervin , B. Lincoln , J. Eker , K. E. \u00c5rz\u00e9n , and G. Buttazzo , \" The jitter margin and its application in the design of real-time control systems,\" in Proceedings of the 10th International Conference on Real-Time and Embedded Computing Systems and Applications , 2004 . A. Cervin, B. Lincoln, J. Eker, K. E. \u00c5rz\u00e9n, and G. Buttazzo, \"The jitter margin and its application in the design of real-time control systems,\" in Proceedings of the 10th International Conference on Real-Time and Embedded Computing Systems and Applications, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2008.45"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2012.79"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435789"},{"key":"e_1_3_2_1_30_1","volume-title":"dissertation","author":"Cervin A.","year":"2003","unstructured":"A. Cervin , \"Integrated control and real-time scheduling,\" Ph. D. dissertation , Lund University , 2003 . A. Cervin, \"Integrated control and real-time scheduling,\" Ph.D. dissertation, Lund University, 2003."},{"key":"e_1_3_2_1_32_1","volume-title":"Computer-Controlled Systems","author":"\u00c5str\u00f6m K. J.","year":"1997","unstructured":"K. J. \u00c5str\u00f6m and B. Wittenmark , Computer-Controlled Systems , 3 rd ed. Prentice Hall , 1997 . K. J. \u00c5str\u00f6m and B. Wittenmark, Computer-Controlled Systems, 3rd ed. Prentice Hall, 1997.","edition":"3"},{"key":"e_1_3_2_1_33_1","first-page":"1319","volume-title":"Jitterbug: A tool for analysis of real-time control performance,\" in Proceedings of the 41st IEEE Conference on Decision and Control","author":"Lincoln B.","year":"2002","unstructured":"B. Lincoln and A. Cervin , \" Jitterbug: A tool for analysis of real-time control performance,\" in Proceedings of the 41st IEEE Conference on Decision and Control , 2002 , pp. 1319 -- 1324 . B. Lincoln and A. Cervin, \"Jitterbug: A tool for analysis of real-time control performance,\" in Proceedings of the 41st IEEE Conference on Decision and Control, 2002, pp. 1319--1324."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364709"},{"key":"e_1_3_2_1_35_1","volume-title":"Anomaly detection: A survey","author":"Chandola V.","year":"2007","unstructured":"V. Chandola , A. Banerjee , and V. Kumar , \" Anomaly detection: A survey ,\" 2007 . V. Chandola, A. Banerjee, and V. Kumar, \"Anomaly detection: A survey,\" 2007."},{"key":"e_1_3_2_1_36_1","volume-title":"Lisboa","author":"Ribeiro M. I.","year":"2004","unstructured":"M. I. Ribeiro , \"Gaussian probability density functions: Properties and error characterization,\" Institute for Systems and Robotics , Lisboa , Portugal , 2004 . M. I. Ribeiro, \"Gaussian probability density functions: Properties and error characterization,\" Institute for Systems and Robotics, Lisboa, Portugal, 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1201\/b12171"},{"key":"e_1_3_2_1_38_1","unstructured":"E. W. Weisstein \"Normal difference distribution.\" {Online}. Available: http:\/\/mathworld.wolfram.com\/NormalDifferenceDistribution.html  E. W. Weisstein \"Normal difference distribution.\" {Online}. Available: http:\/\/mathworld.wolfram.com\/NormalDifferenceDistribution.html"},{"key":"e_1_3_2_1_39_1","volume-title":"Engineering statistics","author":"Montgomery D. C.","year":"2009","unstructured":"D. C. Montgomery , G. C. Runger , and N. F. Hubele , Engineering statistics . John Wiley & Sons , 2009 . D. C. Montgomery, G. C. Runger, and N. F. Hubele, Engineering statistics. John Wiley & Sons, 2009."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/321738.321743"}],"event":{"name":"RTNS '16: 24th International Conference on Real-Time Networks and Systems","sponsor":["REGIONB Region Bretagne"],"location":"Brest France","acronym":"RTNS '16"},"container-title":["Proceedings of the 24th International Conference on Real-Time Networks and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2997465.2997478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2997465.2997478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:31Z","timestamp":1750218631000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2997465.2997478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,19]]},"references-count":39,"alternative-id":["10.1145\/2997465.2997478","10.1145\/2997465"],"URL":"https:\/\/doi.org\/10.1145\/2997465.2997478","relation":{},"subject":[],"published":{"date-parts":[[2016,10,19]]},"assertion":[{"value":"2016-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}