{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:46:39Z","timestamp":1769917599869,"version":"3.49.0"},"reference-count":161,"publisher":"Emerald","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"abstract":"<jats:p>System resilience captures the ability of the system to withstand a major disruption within acceptable performance degradation and to recover within an acceptable time frame. In this monograph we consider two possible sources of major disruptions, i.e., component faults and cyber intrusions. A component fault is an indigenous activity that renders unavailability or inaccessibility of certain functions within a component, either permanently or temporarily. It typically generates safety and performance concerns. Cyber intrusion on the other hand is an exogenous activity that tampers privacy, confidentiality, availability, or integrity of the system. These two sources are not always independent from each other. For example, a cyber intrusion may trigger a component fault, whereas a component fault may open a door for cyber intrusion, e.g., by keeping it undetected. For cyber intrusion, we will focus on opacity, which describes the system\u2019s ability to hide certain secrets from an external observer (or eavesdropper), and sensor and actuator attacks that exploit the system\u2019s existing controller to generate undesirable behaviours.<\/jats:p>\n                  <jats:p>In this monograph, we provide a detailed account of most recent research outcomes on fault diagnosis, opacity analysis and enhancement, and cyber security analysis and enforcement, within suitable discrete event system modelling frameworks. In each case, we describe basic problem statements and key concepts, and then point out the key challenges in each research area. After that, we present a thorough review of state-of-the-art techniques, and discuss their advantages and disadvantages. Finally, we highlight key research directions for further exploration.<\/jats:p>","DOI":"10.1561\/2600000024","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T08:22:42Z","timestamp":1629188562000},"page":"285-443","source":"Crossref","is-referenced-by-count":48,"title":["Analysis and Control for Resilience of Discrete Event Systems"],"prefix":"10.1561","volume":"8","author":[{"given":"Carlos Basilio","family":"Jo\u00e3o","sequence":"first","affiliation":[{"name":"Universidade Federal do Rio de Janeiro"}]},{"given":"N. Hadjicostis","family":"Christoforos","sequence":"additional","affiliation":[{"name":"University of Cyprus ;"}]},{"given":"Su","family":"Rong","sequence":"additional","affiliation":[{"name":"Nanyang Technological University ;"}]}],"member":"140","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"2025121805090158200_ref001","first-page":"4730","author":"Alcaraz-Mejia","year":"2003"},{"key":"2025121805090158200_ref002","first-page":"5602","author":"Alves","year":"2019"},{"issue":"5","key":"2025121805090158200_ref003","doi-asserted-by":"crossref","first-page":"2206","DOI":"10.1109\/TAC.2020.3007384","article-title":"Supervisory control of networked discrete event systems with timing structure","volume":"66","author":"Alves","year":"2021","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"4","key":"2025121805090158200_ref004","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/s10626-007-0020-5","article-title":"Concurrent secrets","volume":"17","author":"Badouel","year":"2007","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref005","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1007\/s40313-020-00594-9","article-title":"Predictability of discrete-event systems with cycles of states connected with unobservable events","volume":"31","author":"Barcelos","year":"2020","journal-title":"Journal of Control, Automation and Electrical Systems"},{"issue":"7","key":"2025121805090158200_ref006","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.ifacol.2018.06.286","article-title":"Enforcing current-state opacity through shuffle in event observations","volume":"51","author":"Barcelos","year":"2018","journal-title":"IFAC-PapersOnLine"},{"issue":"7","key":"2025121805090158200_ref007","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ifacol.2018.06.321","article-title":"An algebraic characterization of language-based opacity in labeled Petri nets","volume":"51","author":"Basile","year":"2018","journal-title":"IFAC-PapersOnLine"},{"issue":"3","key":"2025121805090158200_ref008","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10626-012-0129-z","article-title":"Computation of minimal event bases that ensure diagnosability","volume":"22","author":"Basilio","year":"2012","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref009","first-page":"2202","author":"Basilio","year":"2009"},{"issue":"2","key":"2025121805090158200_ref010","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1017\/S0960129513000637","article-title":"Quantifying opacity","volume":"25","author":"B\u00e9rard","year":"2015","journal-title":"Mathematical Structures in Computer Science"},{"issue":"10","key":"2025121805090158200_ref011","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/9.467679","article-title":"On forbidden state problems for a class of controlled Petri nets","volume":"40","author":"Boel","year":"1995","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref012","first-page":"24","author":"Boel","year":"2003"},{"issue":"6","key":"2025121805090158200_ref013","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s10207-008-0058-x","article-title":"Opacity generalised to transition systems","volume":"7","author":"Bryans","year":"2008","journal-title":"International Journal of Information Security"},{"key":"2025121805090158200_ref014","first-page":"8195","author":"Bryans","year":"2005"},{"key":"2025121805090158200_ref015","first-page":"159","author":"Bryans","year":"2004"},{"key":"2025121805090158200_ref016","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.entcs.2004.10.010","article-title":"Modelling opacity using Petri nets","volume":"121","author":"Bryans","year":"2005","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"9","key":"2025121805090158200_ref017","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1016\/j.conengprac.2010.12.010","article-title":"Discrete event diagnosis using labeled Petri nets. An application to manufacturing systems","volume":"19","author":"Cabasino","year":"2011","journal-title":"Control Engineering Practice"},{"issue":"1","key":"2025121805090158200_ref018","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/TAC.2014.2332238","article-title":"A Petri net diagnoser for discrete event systems modeled by finite state automata","volume":"60","author":"Cabral","year":"2014","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref019","first-page":"495","author":"Cardenas","year":"2008"},{"key":"2025121805090158200_ref020","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.automatica.2018.07.017","article-title":"Detection and mitigation of classes of attacks in supervisory control systems","volume":"97","author":"Carvalho","year":"2018","journal-title":"Automatica"},{"issue":"9","key":"2025121805090158200_ref021","doi-asserted-by":"crossref","first-page":"2068","DOI":"10.1016\/j.automatica.2012.06.042","article-title":"Robust diagnosis of discrete event systems against intermittent loss of observations","volume":"48","author":"Carvalho","year":"2012","journal-title":"Automatica"},{"key":"2025121805090158200_ref022","first-page":"8737","author":"Carvalho","year":"2011"},{"issue":"1","key":"2025121805090158200_ref023","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.automatica.2012.09.017","article-title":"Robust diagnosis of discrete-event systems against permanent loss of observations","volume":"49","author":"Carvalho","year":"2013","journal-title":"Automatica"},{"key":"2025121805090158200_ref024","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.arcontrol.2021.03.007","article-title":"Comparative analysis of related notions of robust diagnosability of Discrete-Event Systems","volume":"51","author":"Carvalho","year":"2021","journal-title":"Annual Reviews in Control"},{"key":"2025121805090158200_ref025","first-page":"298","author":"Carvalho","year":"2016"},{"key":"2025121805090158200_ref026","author":"Cassandras","year":"2009","journal-title":"Introduction to Discrete Event Systems"},{"key":"2025121805090158200_ref027","first-page":"21","author":"Cassez","year":"2009"},{"issue":"1","key":"2025121805090158200_ref028","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/s10703-012-0141-9","article-title":"Synthesis of opaque systems with static and dynamic masks","volume":"40","author":"Cassez","year":"2012","journal-title":"Formal Methods in System Design"},{"key":"2025121805090158200_ref029","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.automatica.2018.04.021","article-title":"On-line verification of current-state opacity by Petri nets and integer linear programming","volume":"94","author":"Cong","year":"2018","journal-title":"Automatica"},{"issue":"1","key":"2025121805090158200_ref030","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/s10626-006-6177-5","article-title":"Diagnosability of discrete event systems with modular structure","volume":"16","author":"Contant","year":"2006","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref031","author":"Cormen","year":"2009","journal-title":"Introduction to Algorithms"},{"key":"2025121805090158200_ref032","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1023\/A:1008335115538","article-title":"Coordinated decentralized protocols for failure diagnosis of discrete event systems","volume":"12","author":"Debouk","year":"2000","journal-title":"Discrete Event Dynamic Systems"},{"issue":"4","key":"2025121805090158200_ref033","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1023\/A:1019770124060","article-title":"On an optimization problem in sensor selection","volume":"12","author":"Debouk","year":"2002","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref034","doi-asserted-by":"crossref","first-page":"394411","DOI":"10.1016\/j.arcontrol.2019.04.011","article-title":"A systems and control perspective of CPS security","volume":"47","author":"Dibaji","year":"2019","journal-title":"Annual Reviews in Control"},{"issue":"5","key":"2025121805090158200_ref035","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TAC.2010.2042008","article-title":"Supervisory control for opacity","volume":"55","author":"Dubreil","year":"2010","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref036","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-319-32125-7_6","volume-title":"Cyber-security of SCADA and other industrial control systems","author":"Evancich","year":"2016"},{"key":"2025121805090158200_ref037","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/s10626-007-0016-1","article-title":"Partial order techniques for distributed discrete event systems: why you cannot avoid using them","volume":"17","author":"Fabre","year":"2007","journal-title":"Discrete Event Dynamic Systems"},{"issue":"4","key":"2025121805090158200_ref038","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10626-014-0196-4","article-title":"Enforcement and validation (at runtime) of various notions of opacity","volume":"25","author":"Falcone","year":"2015","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref039","first-page":"7271","author":"Falcone","year":"2013"},{"issue":"6","key":"2025121805090158200_ref040","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","article-title":"Secure estimation and control for cyber-physical systems under adversarial attacks","volume":"59","author":"Fawzi","year":"2014","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref041","first-page":"2352","author":"Gao","year":"2019"},{"issue":"3","key":"2025121805090158200_ref042","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10626-005-2866-8","article-title":"Modular fault diagnosis based on discrete event systems","volume":"15","author":"Garcia","year":"2005","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref043","first-page":"316","author":"Genc","year":"2003"},{"key":"2025121805090158200_ref044","author":"Genc","year":"2008"},{"issue":"2","key":"2025121805090158200_ref045","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.automatica.2008.06.022","article-title":"Predictability of event occurrences in partially-observed discrete-event systems","volume":"45","author":"Genc","year":"2009","journal-title":"Automatica"},{"issue":"4","key":"2025121805090158200_ref046","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1109\/9.286260","article-title":"Blocking and controllability of Petri nets in supervisory control","volume":"39","author":"Giua","year":"1994","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref047","first-page":"275","author":"Grumberg","year":"2004"},{"key":"2025121805090158200_ref048","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-30821-6","author":"Hadjicostis","year":"2020","journal-title":"Estimation and Inference in Discrete Event Systems"},{"key":"2025121805090158200_ref049","first-page":"607","author":"Henry","year":"2009"},{"issue":"5","key":"2025121805090158200_ref050","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1109\/9.53517","article-title":"Synthesis of feedback control logic for a class of controlled Petri nets","volume":"35","author":"Holloway","year":"1990","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref051","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.ress.2015.08.006","article-title":"A review of definitions and measures of system resilience","volume":"145","author":"Hosseini","year":"2016","journal-title":"Reliability Engineering & System Safety"},{"key":"2025121805090158200_ref052","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.arcontrol.2016.04.015","article-title":"Overview of discrete event systems opacity: Models, validation, and quantification","volume":"41","author":"Jacob","year":"2016","journal-title":"Annual Reviews in Control"},{"issue":"5","key":"2025121805090158200_ref053","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","article-title":"A survey of emerging threats in cybersecurity","volume":"80","author":"Jang-Jaccard","year":"2014","journal-title":"Journal of Computer and System Sciences"},{"key":"2025121805090158200_ref054","doi-asserted-by":"crossref","first-page":"6602","DOI":"10.3390\/e16126602","article-title":"Detection and modeling of cyber attacks with Petri nets","volume":"16","author":"Jasiul","year":"2014","journal-title":"Entropy"},{"key":"2025121805090158200_ref055","first-page":"4866","volume-title":"Proceedings of the 56th IEEE Conference on Decision and Control (CDC)","author":"Ji","year":"2017"},{"key":"2025121805090158200_ref056","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.automatica.2018.03.041","article-title":"Enforcement of opacity by public and private insertion functions","volume":"93","author":"Ji","year":"2018","journal-title":"Automatica"},{"issue":"7","key":"2025121805090158200_ref057","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.ifacol.2018.06.315","article-title":"Opacity enforcement by insertion functions under energy constraints","volume":"51","author":"Ji","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"2025121805090158200_ref058","doi-asserted-by":"crossref","first-page":"108476","DOI":"10.1016\/j.automatica.2019.06.028","article-title":"Enforcing opacity by insertion functions under multiple energy constraints","volume":"108","author":"Ji","year":"2019","journal-title":"Automatica"},{"issue":"10","key":"2025121805090158200_ref059","doi-asserted-by":"crossref","first-page":"4369","DOI":"10.1109\/TAC.2019.2897553","article-title":"Opacity enforcement using nondeterministic publicly known edit functions","volume":"64","author":"Ji","year":"2019","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"8","key":"2025121805090158200_ref060","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1109\/9.940942","article-title":"A polynomial algorithm for testing diagnosability of discrete-event systems","volume":"46","author":"Jiang","year":"2001","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"3","key":"2025121805090158200_ref061","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1109\/TAC.2003.809144","article-title":"Optimal sensor selection for discrete-event systems with partial observation","volume":"48","author":"Jiang","year":"2003","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"1","key":"2025121805090158200_ref062","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1137\/0204007","article-title":"Finding all the elementary circuits of a directed graph","volume":"4","author":"Johnson","year":"1975","journal-title":"SIAM Journal of Computing"},{"issue":"12","key":"2025121805090158200_ref063","doi-asserted-by":"crossref","first-page":"2598","DOI":"10.1080\/00207179.2015.1051587","article-title":"Diagnosability of discrete event systems subject to permanent sensor failures","volume":"88","author":"Kanagawa","year":"2015","journal-title":"International Journal of Control"},{"key":"2025121805090158200_ref064","first-page":"1","author":"Keroglou","year":"2013"},{"issue":"2","key":"2025121805090158200_ref065","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s10626-017-0263-8","article-title":"Probabilistic system opacity in discrete event systems","volume":"28","author":"Keroglou","year":"2018","journal-title":"Discrete Event Dynamic Systems"},{"issue":"7","key":"2025121805090158200_ref066","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.ifacol.2018.06.331","article-title":"Insertion functions with memory for opacity enforcement","volume":"51","author":"Keroglou","year":"2018","journal-title":"IFAC-PapersOnLine"},{"issue":"2","key":"2025121805090158200_ref067","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TASE.2012.2189563","article-title":"Conjunctive and disjunctive architectures for decentralized prognosis of failures in discrete-event systems","volume":"9","author":"Khoumsi","year":"2012","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"2025121805090158200_ref068","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","article-title":"A survey of cyber security management in industrial control systems","volume":"9","author":"Knowles","year":"2015","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"5","key":"2025121805090158200_ref069","doi-asserted-by":"crossref","first-page":"1391","DOI":"10.1109\/TAC.2013.2283756","article-title":"Comments on \"Polynomial time verification of decentralized diagnosability of discrete event systems\" vs. \"Decentralized failure diagnosis of discrete event systems\": Complexity clarification","volume":"59","author":"Kumar","year":"2014","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"1","key":"2025121805090158200_ref070","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TAC.2009.2034216","article-title":"Decentralized prognosis of failures in discrete event systems","volume":"55","author":"Kumar","year":"2010","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref071","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.arcontrol.2018.04.002","article-title":"On the history of diagnosability and opacity in discrete event systems","volume":"45","author":"Lafortune","year":"2018","journal-title":"Annual Reviews in Control"},{"key":"2025121805090158200_ref072","article-title":"Verification of detectability for unambiguous weighted automata","author":"Lai","year":"2020"},{"key":"2025121805090158200_ref073","first-page":"98","article-title":"Probabilistic opacity for a passive adversary and its application to Chaum\u2019s voting scheme","volume":"2005","author":"Lakhnech","year":"2005","journal-title":"IACR Cryptology ePrint Archive"},{"key":"2025121805090158200_ref074","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.ins.2020.04.024","article-title":"Verification of C detectability using Petri nets","volume":"528","author":"Lan","year":"2020","journal-title":"Information Sciences"},{"key":"2025121805090158200_ref075","first-page":"1740","author":"Lefebvre","year":"2019"},{"issue":"1","key":"2025121805090158200_ref076","first-page":"12333","article-title":"Security against network attacks in supervisory control systems","volume":"50","author":"Lima","year":"2017","journal-title":"IFACPapersOnLine"},{"issue":"7","key":"2025121805090158200_ref077","first-page":"179","article-title":"Detectable and undetectable network attack security of cyber-physical systems","volume":"51","author":"Lima","year":"2018","journal-title":"IFACPapersOnLine"},{"issue":"1","key":"2025121805090158200_ref078","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF01441211","article-title":"Diagnosability of discrete event systems and its applications","volume":"4","author":"Lin","year":"1994","journal-title":"Discrete Event Dynamic Systems"},{"issue":"1","key":"2025121805090158200_ref079","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/TCNS.2019.2915024","article-title":"State estimation of multichannel networked discrete event systems","volume":"7","author":"Lin","year":"2020","journal-title":"IEEE Transactions on Control of Network Systems"},{"issue":"3","key":"2025121805090158200_ref080","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0020-0255(88)90002-3","article-title":"Decentralized supervisory control of discrete-event systems","volume":"44","author":"Lin","year":"1988","journal-title":"Information Sciences"},{"issue":"2","key":"2025121805090158200_ref081","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1137\/130914942","article-title":"Control of networked discrete event systems: dealing with communication delays and losses","volume":"52","author":"Lin","year":"2014","journal-title":"SIAM Journal on Control and Optimization"},{"key":"2025121805090158200_ref082","first-page":"5614","article-title":"Synthesis of supremal successful normal actuator attackers on normal supervisors","author":"Lin","year":"2019"},{"key":"2025121805090158200_ref083","author":"Lin","year":"2020"},{"key":"2025121805090158200_ref084","first-page":"7659","author":"Lin","year":"2019"},{"key":"2025121805090158200_ref085","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1007\/s10626-020-00312-2","article-title":"Synthesis of covert actuator attackers for free","volume":"30","author":"Lin","year":"2020","journal-title":"Discrete Event Dynamic Systems"},{"issue":"1","key":"2025121805090158200_ref086","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/TASE.2018.2868330","article-title":"Predictability of failure event occurrences in decentralized discrete-event systems and polynomial-time verification","volume":"16","author":"Liu","year":"2019","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"2025121805090158200_ref087","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.automatica.2018.12.019","article-title":"Complexity of detectability, opacity and A-diagnosability for modular discrete event systems","volume":"101","author":"Masopust","year":"2019","journal-title":"Automatica"},{"key":"2025121805090158200_ref088","first-page":"4224","author":"Meira-G\u00f3es","year":"2017"},{"key":"2025121805090158200_ref089","author":"Meira-G\u00f3es","year":"2020"},{"key":"2025121805090158200_ref090","first-page":"5620","author":"Meira-G\u00f3es","year":"2019"},{"issue":"4","key":"2025121805090158200_ref091","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1109\/TAC.2019.2934708","article-title":"Transforming opacity verification to nonblocking verification in modular systems","volume":"65","author":"Mohajerani","year":"2019","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"1","key":"2025121805090158200_ref092","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TAC.2015.2427711","article-title":"Polynomial time verification of decentralized diagnosability of discrete event systems' versus 'Decentralized failure diagnosis of discrete event systems: A critical appraisal'","volume":"61","author":"Moreira","year":"2016","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"7","key":"2025121805090158200_ref093","doi-asserted-by":"crossref","first-page":"1679","DOI":"10.1109\/TAC.2011.2124950","article-title":"Polynomial time verification of decentralized diagnosability of discrete event systems","volume":"56","author":"Moreira","year":"2011","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"7","key":"2025121805090158200_ref094","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1016\/j.ifacol.2018.06.337","article-title":"Compositional visible bisimulation abstraction applied to opacity verification","volume":"51","author":"Noori-Hosseini","year":"2018","journal-title":"IFAC-PapersOnLine"},{"issue":"2","key":"2025121805090158200_ref095","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/s10626-017-0265-6","article-title":"Codiagnosability of networked discrete event systems subject to communication delays and intermittent loss of observation","volume":"28","author":"Nunes","year":"2018","journal-title":"Discrete Event Dynamic Systems"},{"issue":"8","key":"2025121805090158200_ref096","doi-asserted-by":"crossref","DOI":"10.1016\/j.automatica.2005.03.017","article-title":"Safe diagnosability for fault-tolerant supervision of discrete-event systems","volume":"41","author":"Paoli","year":"2005","journal-title":"Automatica"},{"issue":"4","key":"2025121805090158200_ref097","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1016\/j.automatica.2011.01.007","article-title":"Active fault tolerant control of discrete event systems using online diagnostics","volume":"47","author":"Paoli","year":"2011","journal-title":"Automatica"},{"issue":"10","key":"2025121805090158200_ref098","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/9.956052","article-title":"Deadlock avoidance in sequential resource allocation systems with multiple resource acquisitions and flexible routings","volume":"46","author":"Park","year":"2001","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref099","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.procs.2015.09.199","article-title":"Using discrete event simulation to model attacker interactions with cyber and physical security systems","volume":"61","author":"Perkins","year":"2015","journal-title":"Procedia Computer Science"},{"issue":"5","key":"2025121805090158200_ref100","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3182\/20090610-3-IT-4004.00017","article-title":"Discrete Event Model-Based Approach for Fault Detection and Isolation of Manufacturing Systems","volume":"42","author":"Philippot","year":"2009","journal-title":"IFAC Proceedings Volumes"},{"issue":"2","key":"2025121805090158200_ref101","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/TSMCA.2005.853503","article-title":"Decentralized failure diagnosis of discrete event systems","volume":"36","author":"Qiu","year":"2006","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans"},{"issue":"1","key":"2025121805090158200_ref102","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1137\/0325013","article-title":"Supervisory control of a class of discrete event processes","volume":"25","author":"Ramadge","year":"1987","journal-title":"SIAM Journal on Control and Optimization"},{"issue":"4","key":"2025121805090158200_ref103","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/TAC.2019.2920837","article-title":"Notions of centralized and decentralized opacity in linear systems","volume":"65","author":"Ramasubramanian","year":"2019","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref104","first-page":"99","author":"Rasouli","year":"2014"},{"key":"2025121805090158200_ref105","first-page":"632","author":"Rieger","year":"2009"},{"issue":"1","key":"2025121805090158200_ref106","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1023\/A:1013335803945","article-title":"Diagnosing discrete-event systems: extending the \"diagnoser approach\" to deal with telecommunication networks","volume":"12","author":"Roz\u00e9","year":"2002","journal-title":"Discrete Event Dynamic Systems"},{"issue":"3","key":"2025121805090158200_ref107","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/s10626-012-0152-0","article-title":"Supervisor synthesis for discrete event systems under partial observation and arbitrary forbidden state specifications","volume":"24","author":"Ru","year":"2014","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref108","first-page":"5056","author":"Saboori","year":"2007"},{"issue":"5","key":"2025121805090158200_ref109","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1109\/TAC.2011.2170453","article-title":"Opacity-enforcing supervisory strategies via state estimator constructions","volume":"57","author":"Saboori","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"5","key":"2025121805090158200_ref110","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TAC.2011.2173774","article-title":"Verification of infinitestep opacity and complexity considerations","volume":"57","author":"Saboori","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref111","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ins.2013.05.033","article-title":"Verification of initial-state opacity in security applications of discrete event systems","volume":"246","author":"Saboori","year":"2013","journal-title":"Information Sciences"},{"issue":"1","key":"2025121805090158200_ref112","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/TAC.2013.2279914","article-title":"Current-state opacity formulations in probabilistic finite automata","volume":"59","author":"Saboori","year":"2014","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref113","first-page":"328","author":"Saboori","year":"2008"},{"issue":"9","key":"2025121805090158200_ref114","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1016\/j.conengprac.2010.12.003","article-title":"Coverage analysis of mobile agent trajectory via state-based opacity formulations","volume":"19","author":"Saboori","journal-title":"Control Engineering Practice"},{"issue":"3","key":"2025121805090158200_ref115","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1109\/TASE.2011.2106775","article-title":"Verification of K-step opacity and analysis of its complexity","volume":"8","author":"Saboori","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"9","key":"2025121805090158200_ref116","doi-asserted-by":"crossref","first-page":"1555","DOI":"10.1109\/9.412626","article-title":"Diagnosability of discrete-event systems","volume":"40","author":"Sampath","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"2025121805090158200_ref117","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/87.486338","article-title":"Failure diagnosis using discrete event models","volume":"4","author":"Sampath","year":"1996","journal-title":"IEEE Transactions on Control Systems Technology"},{"key":"2025121805090158200_ref118","first-page":"2058","author":"Sampath","year":"2001"},{"key":"2025121805090158200_ref119","author":"Sampath"},{"key":"2025121805090158200_ref120","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/j.automatica.2016.11.026","article-title":"Computation of minimal diagnosis bases of discrete-event systems using verifiers","volume":"77","author":"Santoro","year":"2017","journal-title":"Automatica"},{"key":"2025121805090158200_ref121","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1007\/s10626-018-0268-y","article-title":"Detectability of networked discrete event systems","volume":"28","author":"Sasi","year":"2018","journal-title":"Discrete Event Dynamic Systems"},{"issue":"1","key":"2025121805090158200_ref122","first-page":"187","article-title":"I-detectability of discrete-event systems","volume":"10","author":"Shu","year":"2012","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"8","key":"2025121805090158200_ref123","doi-asserted-by":"crossref","first-page":"2125","DOI":"10.1109\/TAC.2013.2251796","article-title":"Enforcing detectability in controlled discrete event systems","volume":"58","author":"Shu","year":"2013","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"12","key":"2025121805090158200_ref124","doi-asserted-by":"crossref","DOI":"10.1109\/TAC.2007.910713","article-title":"Detectability of discrete event systems","volume":"52","author":"Shu","year":"2007","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref125","first-page":"3200","author":"Su","year":"2017"},{"key":"2025121805090158200_ref126","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.automatica.2018.04.006","article-title":"Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations","volume":"94","author":"Su","year":"2018","journal-title":"Automatica"},{"issue":"1","key":"2025121805090158200_ref127","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1023\/B:DISC.0000005009.40749.b6","article-title":"Supervisor reduction for discreteevent systems","volume":"14","author":"Su","year":"2004","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref128","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.automatica.2018.06.004","article-title":"Supervisor reduction for discreteevent systems","volume":"95","author":"Su","year":"2018","journal-title":"Automatica"},{"issue":"8","key":"2025121805090158200_ref129","doi-asserted-by":"crossref","first-page":"1913","DOI":"10.1016\/j.automatica.2012.06.024","article-title":"Verification of robust diagnosability for partially observed discrete event systems","volume":"48","author":"Takai","year":"2012","journal-title":"Automatica"},{"key":"2025121805090158200_ref130","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.automatica.2014.10.104","article-title":"Robust prognosability for a set of partially observed discrete event systems","volume":"51","author":"Takai","year":"2015","journal-title":"Automatica"},{"issue":"2","key":"2025121805090158200_ref131","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1137\/0201010","article-title":"Depth first search and linear graph algorithms","volume":"1","author":"Tarjan","year":"1972","journal-title":"SIAM Journal of Computer"},{"key":"2025121805090158200_ref132","first-page":"55","author":"Teixeira","year":"2012"},{"key":"2025121805090158200_ref133","first-page":"1053","author":"Tong"},{"key":"2025121805090158200_ref134","author":"Tong"},{"issue":"6","key":"2025121805090158200_ref135","doi-asserted-by":"crossref","first-page":"2823","DOI":"10.1109\/TAC.2016.2620429","article-title":"Verification of statebased opacity using Petri nets","volume":"62","author":"Tong","year":"2017","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"2025121805090158200_ref136","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10626-017-0264-7","article-title":"Current-state opacity enforcement in discrete event systems under incomparable observations","volume":"28","author":"Tong","journal-title":"Discrete Event Dynamic Systems"},{"issue":"9","key":"2025121805090158200_ref137","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1109\/TAC.2004.834116","article-title":"Decentralized control of discrete-event systems with bounded or unbounded delay communication","volume":"49","author":"Tripakis","year":"2004","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"5","key":"2025121805090158200_ref138","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1002\/sys.21325","article-title":"Designing resilient systems-of-systems: A survey of metrics, methods, and challenges","volume":"18","author":"Uday","year":"2015","journal-title":"Systems Engineering"},{"key":"2025121805090158200_ref139","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.automatica.2018.12.013","article-title":"Codiagnosability of discrete event systems revisited: A new necessary and sufficient condition and its applications","volume":"101","author":"Viana","year":"2019","journal-title":"Automatica"},{"issue":"10","key":"2025121805090158200_ref140","doi-asserted-by":"crossref","first-page":"4361","DOI":"10.1109\/TAC.2019.2897268","article-title":"Codiagnosability analysis of discrete-event systems modeled by weighted automata","volume":"64","author":"Viana","year":"2019","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref141","first-page":"2301","author":"Viswanadham","year":"1988"},{"key":"2025121805090158200_ref142","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1007\/s13235-018-0285-3","article-title":"Supervisory control of discrete-event systems under attacks","volume":"9","author":"Wakaiki","year":"2018","journal-title":"Dynamic Games and Applications"},{"issue":"11","key":"2025121805090158200_ref143","doi-asserted-by":"crossref","first-page":"2845","DOI":"10.1109\/TCAD.2018.2857363","article-title":"The opacity of real-time automata","volume":"37","author":"Wang","year":"2018","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"2025121805090158200_ref144","first-page":"2015","author":"Wang"},{"key":"2025121805090158200_ref145","first-page":"5350","author":"Wang"},{"key":"2025121805090158200_ref146","author":"Wonham","year":"2019"},{"key":"2025121805090158200_ref147","first-page":"3026","author":"Wu","year":"2018"},{"issue":"3","key":"2025121805090158200_ref148","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10626-012-0145-z","article-title":"Comparative analysis of related notions of opacity in centralized and coordinated architectures","volume":"23","author":"Wu","year":"2013","journal-title":"Discrete Event Dynamic Systems"},{"issue":"5","key":"2025121805090158200_ref149","doi-asserted-by":"crossref","first-page":"1336","DOI":"10.1016\/j.automatica.2014.02.038","article-title":"Synthesis of insertion functions for enforcement of opacity security properties","volume":"50","author":"Wu","year":"2014","journal-title":"Automatica"},{"issue":"3","key":"2025121805090158200_ref150","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1109\/TAC.2015.2440632","article-title":"Synthesis of optimal insertion functions for opacity enforcement","volume":"61","author":"Wu","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"2025121805090158200_ref151","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3182\/20140514-3-FR-4046.00008","article-title":"Ensuring privacy in location-based services: An approach based on opacity enforcement","volume":"47","author":"Wu","year":"2014","journal-title":"IFAC Proceedings Volumes"},{"issue":"8","key":"2025121805090158200_ref152","doi-asserted-by":"crossref","DOI":"10.1109\/TAC.2015.2484359","article-title":"A uniform approach for synthesizing property-enforcing supervisors for partially-observed discrete-event systems","volume":"61","author":"Yin","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"key":"2025121805090158200_ref153","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.automatica.2017.02.037","article-title":"A new approach for the verification of infinite-step and K-step opacity using two-way observers","volume":"80","author":"Yin","year":"2017","journal-title":"Automatica"},{"key":"2025121805090158200_ref154","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.automatica.2018.10.049","article-title":"Infinite-step opacity and K-step opacity of stochastic discrete-event systems","volume":"99","author":"Yin","year":"2019","journal-title":"Automatica"},{"key":"2025121805090158200_ref155","author":"Yin","year":"2019"},{"issue":"9","key":"2025121805090158200_ref156","first-page":"1491","article-title":"Polynomial-time verification of diagnosability of partially observed discrete-event systems","volume":"47","author":"Yoo","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"9","key":"2025121805090158200_ref157","first-page":"1495","article-title":"NP-completeness of sensor selection problems arising in partially observed discrete-event systems","volume":"47","author":"Yoo","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"2","key":"2025121805090158200_ref158","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.arcontrol.2013.09.009","article-title":"Overview of fault diagnosis methods for discrete event systems","volume":"37","author":"Zaytoon","year":"2013","journal-title":"Annual Reviews in Control"},{"key":"2025121805090158200_ref159","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s10626-020-00311-3","article-title":"On detectability of labeled Petri nets and finite automata","volume":"30","author":"Zhang","year":"2020","journal-title":"Discrete Event Dynamic Systems"},{"key":"2025121805090158200_ref160","first-page":"195","author":"Zhang","year":"2020"},{"key":"2025121805090158200_ref161","first-page":"1760","author":"Zhu","year":"2019"}],"container-title":["Foundations and Trends\u00ae in Systems and Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/ftsys\/article-pdf\/8\/4\/285\/11098778\/2600000024en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/ftsys\/article-pdf\/8\/4\/285\/11098778\/2600000024en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T10:10:45Z","timestamp":1766052645000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/ftsys\/article\/8\/4\/285\/1330399\/Analysis-and-Control-for-Resilience-of-Discrete"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":161,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8,17]]}},"URL":"https:\/\/doi.org\/10.1561\/2600000024","relation":{},"ISSN":["2325-6818","2325-6826"],"issn-type":[{"value":"2325-6818","type":"print"},{"value":"2325-6826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,17]]}}}