Adaptive Parameterisation for Efficient Detection of False Data Injections Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1145/3777903
Increasing interconnectivity in modern safety-critical cyber-physical systems (CPSs) renders them susceptible to attacks like false data injection (FDI). Due to computation and communication resource constraints, it is infeasible to encrypt all data exchanges in such systems. As the other alternative, the lightweight statistical detectors are system-agnostic in nature; attackers can launch stealthy FDI attacks with a high degree of sophistication. This research introduces an adaptive parameterisation method for stateful anomaly detectors to fill this security gap. The study includes a theoretical analysis for statistical evidence of stealthy data falsifications. The proposed adaptive detection framework has the capability to continuously observe the system’s behaviour in real time, with the goal of rapidly detecting FDI incidents using this statistical evidence. We propose a novel parameter tuning strategy to guarantee early detection of FDI attacks, keeping the false alarms to a minimum. Its efficacy is evaluated in CPS case studies from different domains and in an automotive Hardware-in-the-Loop (HIL) setup.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1145/3777903
- OA Status
- hybrid
- References
- 32
- OpenAlex ID
- https://openalex.org/W7106210141
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W7106210141Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1145/3777903Digital Object Identifier
- Title
-
Adaptive Parameterisation for Efficient Detection of False Data InjectionsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-11-21Full publication date if available
- Authors
-
Akash Bhattacharya, Sunandan Adhikary, Ipsita Koley, Vivek Loya, Soumyajit DeyList of authors in order
- Landing page
-
https://doi.org/10.1145/3777903Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1145/3777903Direct OA link when available
- Concepts
-
Computer science, Anomaly detection, Data mining, Interconnectivity, Intrusion detection system, Detector, Computation, Statistical model, Encryption, Real-time computing, Resource (disambiguation), Stateful firewall, Statistical hypothesis testing, Statistical analysis, Reliability (semiconductor), Data modeling, Error detection and correction, Anomaly (physics), Data security, Algorithm, Automotive industry, Synthetic data, Root cause, Rare events, Resource constraints, Artificial intelligenceTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
32Number of works referenced by this work
Full payload
| id | https://openalex.org/W7106210141 |
|---|---|
| doi | https://doi.org/10.1145/3777903 |
| ids.doi | https://doi.org/10.1145/3777903 |
| ids.openalex | https://openalex.org/W7106210141 |
| fwci | 0.0 |
| type | article |
| title | Adaptive Parameterisation for Efficient Detection of False Data Injections |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10917 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9314435124397278 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2207 |
| topics[0].subfield.display_name | Control and Systems Engineering |
| topics[0].display_name | Smart Grid Security and Resilience |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.012036669068038464 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T11689 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.008300887420773506 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Adversarial Robustness in Machine Learning |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6806380748748779 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C739882 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6143341064453125 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3560506 |
| concepts[1].display_name | Anomaly detection |
| concepts[2].id | https://openalex.org/C124101348 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5434376001358032 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[2].display_name | Data mining |
| concepts[3].id | https://openalex.org/C25516864 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5393578410148621 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1665949 |
| concepts[3].display_name | Interconnectivity |
| concepts[4].id | https://openalex.org/C35525427 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5167350172996521 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q745881 |
| concepts[4].display_name | Intrusion detection system |
| concepts[5].id | https://openalex.org/C94915269 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5017688274383545 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1834857 |
| concepts[5].display_name | Detector |
| concepts[6].id | https://openalex.org/C45374587 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4891704320907593 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q12525525 |
| concepts[6].display_name | Computation |
| concepts[7].id | https://openalex.org/C114289077 |
| concepts[7].level | 2 |
| concepts[7].score | 0.3988640010356903 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3284399 |
| concepts[7].display_name | Statistical model |
| concepts[8].id | https://openalex.org/C148730421 |
| concepts[8].level | 2 |
| concepts[8].score | 0.3844282031059265 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[8].display_name | Encryption |
| concepts[9].id | https://openalex.org/C79403827 |
| concepts[9].level | 1 |
| concepts[9].score | 0.3394607603549957 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[9].display_name | Real-time computing |
| concepts[10].id | https://openalex.org/C206345919 |
| concepts[10].level | 2 |
| concepts[10].score | 0.33342644572257996 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q20380951 |
| concepts[10].display_name | Resource (disambiguation) |
| concepts[11].id | https://openalex.org/C22927095 |
| concepts[11].level | 3 |
| concepts[11].score | 0.3271390497684479 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q1784206 |
| concepts[11].display_name | Stateful firewall |
| concepts[12].id | https://openalex.org/C87007009 |
| concepts[12].level | 2 |
| concepts[12].score | 0.3210045099258423 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q210832 |
| concepts[12].display_name | Statistical hypothesis testing |
| concepts[13].id | https://openalex.org/C2986587452 |
| concepts[13].level | 2 |
| concepts[13].score | 0.3206014633178711 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q938438 |
| concepts[13].display_name | Statistical analysis |
| concepts[14].id | https://openalex.org/C43214815 |
| concepts[14].level | 3 |
| concepts[14].score | 0.30824747681617737 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q7310987 |
| concepts[14].display_name | Reliability (semiconductor) |
| concepts[15].id | https://openalex.org/C67186912 |
| concepts[15].level | 2 |
| concepts[15].score | 0.3032269775867462 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q367664 |
| concepts[15].display_name | Data modeling |
| concepts[16].id | https://openalex.org/C103088060 |
| concepts[16].level | 2 |
| concepts[16].score | 0.29109200835227966 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q1062839 |
| concepts[16].display_name | Error detection and correction |
| concepts[17].id | https://openalex.org/C12997251 |
| concepts[17].level | 2 |
| concepts[17].score | 0.28967297077178955 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q567560 |
| concepts[17].display_name | Anomaly (physics) |
| concepts[18].id | https://openalex.org/C10511746 |
| concepts[18].level | 3 |
| concepts[18].score | 0.28469598293304443 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q899388 |
| concepts[18].display_name | Data security |
| concepts[19].id | https://openalex.org/C11413529 |
| concepts[19].level | 1 |
| concepts[19].score | 0.28223925828933716 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[19].display_name | Algorithm |
| concepts[20].id | https://openalex.org/C526921623 |
| concepts[20].level | 2 |
| concepts[20].score | 0.2773635983467102 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q190117 |
| concepts[20].display_name | Automotive industry |
| concepts[21].id | https://openalex.org/C160920958 |
| concepts[21].level | 2 |
| concepts[21].score | 0.26721981167793274 |
| concepts[21].wikidata | https://www.wikidata.org/wiki/Q7662746 |
| concepts[21].display_name | Synthetic data |
| concepts[22].id | https://openalex.org/C84945661 |
| concepts[22].level | 2 |
| concepts[22].score | 0.26643264293670654 |
| concepts[22].wikidata | https://www.wikidata.org/wiki/Q7366567 |
| concepts[22].display_name | Root cause |
| concepts[23].id | https://openalex.org/C2777317252 |
| concepts[23].level | 2 |
| concepts[23].score | 0.26330244541168213 |
| concepts[23].wikidata | https://www.wikidata.org/wiki/Q18393516 |
| concepts[23].display_name | Rare events |
| concepts[24].id | https://openalex.org/C3017813396 |
| concepts[24].level | 2 |
| concepts[24].score | 0.2565910220146179 |
| concepts[24].wikidata | https://www.wikidata.org/wiki/Q17078173 |
| concepts[24].display_name | Resource constraints |
| concepts[25].id | https://openalex.org/C154945302 |
| concepts[25].level | 1 |
| concepts[25].score | 0.25487205386161804 |
| concepts[25].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[25].display_name | Artificial intelligence |
| keywords[0].id | https://openalex.org/keywords/anomaly-detection |
| keywords[0].score | 0.6143341064453125 |
| keywords[0].display_name | Anomaly detection |
| keywords[1].id | https://openalex.org/keywords/interconnectivity |
| keywords[1].score | 0.5393578410148621 |
| keywords[1].display_name | Interconnectivity |
| keywords[2].id | https://openalex.org/keywords/intrusion-detection-system |
| keywords[2].score | 0.5167350172996521 |
| keywords[2].display_name | Intrusion detection system |
| keywords[3].id | https://openalex.org/keywords/detector |
| keywords[3].score | 0.5017688274383545 |
| keywords[3].display_name | Detector |
| keywords[4].id | https://openalex.org/keywords/computation |
| keywords[4].score | 0.4891704320907593 |
| keywords[4].display_name | Computation |
| keywords[5].id | https://openalex.org/keywords/statistical-model |
| keywords[5].score | 0.3988640010356903 |
| keywords[5].display_name | Statistical model |
| keywords[6].id | https://openalex.org/keywords/encryption |
| keywords[6].score | 0.3844282031059265 |
| keywords[6].display_name | Encryption |
| keywords[7].id | https://openalex.org/keywords/resource |
| keywords[7].score | 0.33342644572257996 |
| keywords[7].display_name | Resource (disambiguation) |
| keywords[8].id | https://openalex.org/keywords/stateful-firewall |
| keywords[8].score | 0.3271390497684479 |
| keywords[8].display_name | Stateful firewall |
| language | en |
| locations[0].id | doi:10.1145/3777903 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S136160450 |
| locations[0].source.issn | 1539-9087, 1558-3465 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1539-9087 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | ACM Transactions on Embedded Computing Systems |
| locations[0].source.host_organization | https://openalex.org/P4310319798 |
| locations[0].source.host_organization_name | Association for Computing Machinery |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319798 |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ACM Transactions on Embedded Computing Systems |
| locations[0].landing_page_url | https://doi.org/10.1145/3777903 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A2441878892 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-8748-9969 |
| authorships[0].author.display_name | Akash Bhattacharya |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I145894827 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[0].institutions[0].id | https://openalex.org/I145894827 |
| authorships[0].institutions[0].ror | https://ror.org/https://ror.org/03w5sq511 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I145894827 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Indian Institute of Technology Kharagpur |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Akash Bhattacharya |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[1].author.id | https://openalex.org/A3043174787 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2882-8702 |
| authorships[1].author.display_name | Sunandan Adhikary |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I145894827 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[1].institutions[0].id | https://openalex.org/I145894827 |
| authorships[1].institutions[0].ror | https://ror.org/https://ror.org/03w5sq511 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I145894827 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Indian Institute of Technology Kharagpur |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Sunandan Adhikary |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[2].author.id | https://openalex.org/A3008366614 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-9033-3295 |
| authorships[2].author.display_name | Ipsita Koley |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I145894827 |
| authorships[2].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[2].institutions[0].id | https://openalex.org/I145894827 |
| authorships[2].institutions[0].ror | https://ror.org/https://ror.org/03w5sq511 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I145894827 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Indian Institute of Technology Kharagpur |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Ipsita Koley |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[3].author.id | |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Vivek Loya |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I145894827 |
| authorships[3].affiliations[0].raw_affiliation_string | Indian Institute of Technology Kharagpur |
| authorships[3].institutions[0].id | https://openalex.org/I145894827 |
| authorships[3].institutions[0].ror | https://ror.org/https://ror.org/03w5sq511 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I145894827 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | Indian Institute of Technology Kharagpur |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Vivek Loya |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Indian Institute of Technology Kharagpur |
| authorships[4].author.id | https://openalex.org/A2441591044 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-8758-3947 |
| authorships[4].author.display_name | Soumyajit Dey |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I145894827 |
| authorships[4].affiliations[0].raw_affiliation_string | Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| authorships[4].institutions[0].id | https://openalex.org/I145894827 |
| authorships[4].institutions[0].ror | https://ror.org/https://ror.org/03w5sq511 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I145894827 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | Indian Institute of Technology Kharagpur |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Soumyajit Dey |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Computer Science and Engineering, Indian Institute of Technology Kharagpur |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1145/3777903 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-11-23T00:00:00 |
| display_name | Adaptive Parameterisation for Efficient Detection of False Data Injections |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-23T05:13:22.807545 |
| primary_topic.id | https://openalex.org/T10917 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9314435124397278 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2207 |
| primary_topic.subfield.display_name | Control and Systems Engineering |
| primary_topic.display_name | Smart Grid Security and Resilience |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1145/3777903 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S136160450 |
| best_oa_location.source.issn | 1539-9087, 1558-3465 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1539-9087 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | ACM Transactions on Embedded Computing Systems |
| best_oa_location.source.host_organization | https://openalex.org/P4310319798 |
| best_oa_location.source.host_organization_name | Association for Computing Machinery |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ACM Transactions on Embedded Computing Systems |
| best_oa_location.landing_page_url | https://doi.org/10.1145/3777903 |
| primary_location.id | doi:10.1145/3777903 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S136160450 |
| primary_location.source.issn | 1539-9087, 1558-3465 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1539-9087 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | ACM Transactions on Embedded Computing Systems |
| primary_location.source.host_organization | https://openalex.org/P4310319798 |
| primary_location.source.host_organization_name | Association for Computing Machinery |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319798 |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ACM Transactions on Embedded Computing Systems |
| primary_location.landing_page_url | https://doi.org/10.1145/3777903 |
| publication_date | 2025-11-21 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W3097420500, https://openalex.org/W3178991481, https://openalex.org/W2056451850, https://openalex.org/W2950787783, https://openalex.org/W2536935267, https://openalex.org/W3115892855, https://openalex.org/W2803355698, https://openalex.org/W2402911760, https://openalex.org/W4391786690, https://openalex.org/W3134772926, https://openalex.org/W4200255682, https://openalex.org/W4400189350, https://openalex.org/W3036399443, https://openalex.org/W2039427951, https://openalex.org/W3041482827, https://openalex.org/W2024673847, https://openalex.org/W1965180610, https://openalex.org/W2807864928, https://openalex.org/W2567728531, https://openalex.org/W2911595693, https://openalex.org/W3000053734, https://openalex.org/W2051903196, https://openalex.org/W2963516826, https://openalex.org/W4210791054, https://openalex.org/W2342670290, https://openalex.org/W4291127740, https://openalex.org/W2781896072, https://openalex.org/W2784151957, https://openalex.org/W1557652964, https://openalex.org/W2153775930, https://openalex.org/W1972523481, https://openalex.org/W2003677466 |
| referenced_works_count | 32 |
| abstract_inverted_index.a | 55, 79, 120, 137 |
| abstract_inverted_index.As | 36 |
| abstract_inverted_index.We | 118 |
| abstract_inverted_index.an | 63, 152 |
| abstract_inverted_index.in | 2, 33, 46, 103, 143, 151 |
| abstract_inverted_index.is | 26, 141 |
| abstract_inverted_index.it | 25 |
| abstract_inverted_index.of | 58, 85, 109, 129 |
| abstract_inverted_index.to | 11, 19, 28, 71, 97, 125, 136 |
| abstract_inverted_index.CPS | 144 |
| abstract_inverted_index.Due | 18 |
| abstract_inverted_index.FDI | 52, 112, 130 |
| abstract_inverted_index.Its | 139 |
| abstract_inverted_index.The | 76, 89 |
| abstract_inverted_index.all | 30 |
| abstract_inverted_index.and | 21, 150 |
| abstract_inverted_index.are | 44 |
| abstract_inverted_index.can | 49 |
| abstract_inverted_index.for | 67, 82 |
| abstract_inverted_index.has | 94 |
| abstract_inverted_index.the | 37, 40, 95, 100, 107, 133 |
| abstract_inverted_index.This | 60 |
| abstract_inverted_index.case | 145 |
| abstract_inverted_index.data | 15, 31, 87 |
| abstract_inverted_index.fill | 72 |
| abstract_inverted_index.from | 147 |
| abstract_inverted_index.gap. | 75 |
| abstract_inverted_index.goal | 108 |
| abstract_inverted_index.high | 56 |
| abstract_inverted_index.like | 13 |
| abstract_inverted_index.real | 104 |
| abstract_inverted_index.such | 34 |
| abstract_inverted_index.them | 9 |
| abstract_inverted_index.this | 73, 115 |
| abstract_inverted_index.with | 54, 106 |
| abstract_inverted_index.(HIL) | 155 |
| abstract_inverted_index.early | 127 |
| abstract_inverted_index.false | 14, 134 |
| abstract_inverted_index.novel | 121 |
| abstract_inverted_index.other | 38 |
| abstract_inverted_index.study | 77 |
| abstract_inverted_index.time, | 105 |
| abstract_inverted_index.using | 114 |
| abstract_inverted_index.(CPSs) | 7 |
| abstract_inverted_index.(FDI). | 17 |
| abstract_inverted_index.alarms | 135 |
| abstract_inverted_index.degree | 57 |
| abstract_inverted_index.launch | 50 |
| abstract_inverted_index.method | 66 |
| abstract_inverted_index.modern | 3 |
| abstract_inverted_index.setup. | 156 |
| abstract_inverted_index.tuning | 123 |
| abstract_inverted_index.anomaly | 69 |
| abstract_inverted_index.attacks | 12, 53 |
| abstract_inverted_index.domains | 149 |
| abstract_inverted_index.encrypt | 29 |
| abstract_inverted_index.keeping | 132 |
| abstract_inverted_index.nature; | 47 |
| abstract_inverted_index.observe | 99 |
| abstract_inverted_index.propose | 119 |
| abstract_inverted_index.rapidly | 110 |
| abstract_inverted_index.renders | 8 |
| abstract_inverted_index.studies | 146 |
| abstract_inverted_index.systems | 6 |
| abstract_inverted_index.adaptive | 64, 91 |
| abstract_inverted_index.analysis | 81 |
| abstract_inverted_index.attacks, | 131 |
| abstract_inverted_index.efficacy | 140 |
| abstract_inverted_index.evidence | 84 |
| abstract_inverted_index.includes | 78 |
| abstract_inverted_index.minimum. | 138 |
| abstract_inverted_index.proposed | 90 |
| abstract_inverted_index.research | 61 |
| abstract_inverted_index.resource | 23 |
| abstract_inverted_index.security | 74 |
| abstract_inverted_index.stateful | 68 |
| abstract_inverted_index.stealthy | 51, 86 |
| abstract_inverted_index.strategy | 124 |
| abstract_inverted_index.systems. | 35 |
| abstract_inverted_index.attackers | 48 |
| abstract_inverted_index.behaviour | 102 |
| abstract_inverted_index.detecting | 111 |
| abstract_inverted_index.detection | 92, 128 |
| abstract_inverted_index.detectors | 43, 70 |
| abstract_inverted_index.different | 148 |
| abstract_inverted_index.evaluated | 142 |
| abstract_inverted_index.evidence. | 117 |
| abstract_inverted_index.exchanges | 32 |
| abstract_inverted_index.framework | 93 |
| abstract_inverted_index.guarantee | 126 |
| abstract_inverted_index.incidents | 113 |
| abstract_inverted_index.injection | 16 |
| abstract_inverted_index.parameter | 122 |
| abstract_inverted_index.Increasing | 0 |
| abstract_inverted_index.automotive | 153 |
| abstract_inverted_index.capability | 96 |
| abstract_inverted_index.infeasible | 27 |
| abstract_inverted_index.introduces | 62 |
| abstract_inverted_index.system’s | 101 |
| abstract_inverted_index.computation | 20 |
| abstract_inverted_index.lightweight | 41 |
| abstract_inverted_index.statistical | 42, 83, 116 |
| abstract_inverted_index.susceptible | 10 |
| abstract_inverted_index.theoretical | 80 |
| abstract_inverted_index.alternative, | 39 |
| abstract_inverted_index.constraints, | 24 |
| abstract_inverted_index.continuously | 98 |
| abstract_inverted_index.communication | 22 |
| abstract_inverted_index.cyber-physical | 5 |
| abstract_inverted_index.falsifications. | 88 |
| abstract_inverted_index.safety-critical | 4 |
| abstract_inverted_index.sophistication. | 59 |
| abstract_inverted_index.system-agnostic | 45 |
| abstract_inverted_index.parameterisation | 65 |
| abstract_inverted_index.interconnectivity | 1 |
| abstract_inverted_index.Hardware-in-the-Loop | 154 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| citation_normalized_percentile.value | 0.81007929 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |