Security Verification for Cyber-Physical Systems Using Model Checking Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1109/access.2021.3081587
A malicious attack may endanger human life or pollute environment on a cyber-physical system (CPS). However, successfully attacking a CPS needs not only the knowledge of information technology (IT) but also the domain knowledge of the system’s operation technology (OT). Therefore, it is critical to identify the vulnerabilities of a CPS. This paper proposes a systematic method for the security verification of a CPS, focusing on OT by using model checking with UPPAAL, so as to enhance cyber security. In our security analysis, we considered unsafe situations to be the result of a potentially effective security attack. Thus, we suggested a systematic method to generate security constraints based on the safety constraints (or safety checks) of the CPS and then enhance these security constraints by security verification using model checking with UPPAAL. UPPAAL’s simulation tool can perform a detailed search for each state in various possible model combinations and can explore human-computer interactions more deeply. The contributions of our method are as follows: First, a systematic method is proposed to generate security constraints based on the overall safety requirements at the OT level. Second, the security constraints thus generated can be used for run-time monitoring to identify the possible security attacks when they are violated. Third, this paper proposes to augment normal system modeling with a suggested Attack Module to simulate the potential OT attacks. Finally, the verification results may be used in the following twofold directions: to identify the vulnerabilities for possible design improvements and to suggest the further additions of security constraints.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2021.3081587
- https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdf
- OA Status
- gold
- Cited By
- 8
- References
- 32
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3163389012
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3163389012Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2021.3081587Digital Object Identifier
- Title
-
Security Verification for Cyber-Physical Systems Using Model CheckingWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-01-01Full publication date if available
- Authors
-
Ching-Chieh Chan, Cheng‐Zen Yang, Chin-Feng FanList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2021.3081587Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdfDirect OA link when available
- Concepts
-
Computer science, Model checking, Computer security, Security testing, Cyber-physical system, Domain (mathematical analysis), Computer security model, Security information and event management, Cloud computing security, Theoretical computer science, Mathematical analysis, Cloud computing, Mathematics, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
8Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 1, 2023: 4, 2022: 2Per-year citation counts (last 5 years)
- References (count)
-
32Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3163389012 |
|---|---|
| doi | https://doi.org/10.1109/access.2021.3081587 |
| ids.doi | https://doi.org/10.1109/access.2021.3081587 |
| ids.mag | 3163389012 |
| ids.openalex | https://openalex.org/W3163389012 |
| fwci | 0.92983036 |
| type | article |
| title | Security Verification for Cyber-Physical Systems Using Model Checking |
| biblio.issue | |
| biblio.volume | 9 |
| biblio.last_page | 75186 |
| biblio.first_page | 75169 |
| topics[0].id | https://openalex.org/T10917 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9993000030517578 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2207 |
| topics[0].subfield.display_name | Control and Systems Engineering |
| topics[0].display_name | Smart Grid Security and Resilience |
| topics[1].id | https://openalex.org/T13295 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9991000294685364 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2213 |
| topics[1].subfield.display_name | Safety, Risk, Reliability and Quality |
| topics[1].display_name | Safety Systems Engineering in Autonomy |
| topics[2].id | https://openalex.org/T12423 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9972000122070312 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1712 |
| topics[2].subfield.display_name | Software |
| topics[2].display_name | Software Reliability and Analysis Research |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.8535824418067932 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C110251889 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6093164682388306 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1569697 |
| concepts[1].display_name | Model checking |
| concepts[2].id | https://openalex.org/C38652104 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6037600636482239 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[2].display_name | Computer security |
| concepts[3].id | https://openalex.org/C195518309 |
| concepts[3].level | 5 |
| concepts[3].score | 0.5405764579772949 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q13424265 |
| concepts[3].display_name | Security testing |
| concepts[4].id | https://openalex.org/C179768478 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5174132585525513 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1120057 |
| concepts[4].display_name | Cyber-physical system |
| concepts[5].id | https://openalex.org/C36503486 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5056374073028564 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11235244 |
| concepts[5].display_name | Domain (mathematical analysis) |
| concepts[6].id | https://openalex.org/C121822524 |
| concepts[6].level | 2 |
| concepts[6].score | 0.48945558071136475 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q5157582 |
| concepts[6].display_name | Computer security model |
| concepts[7].id | https://openalex.org/C103377522 |
| concepts[7].level | 4 |
| concepts[7].score | 0.28719115257263184 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3493999 |
| concepts[7].display_name | Security information and event management |
| concepts[8].id | https://openalex.org/C184842701 |
| concepts[8].level | 3 |
| concepts[8].score | 0.24822121858596802 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q370563 |
| concepts[8].display_name | Cloud computing security |
| concepts[9].id | https://openalex.org/C80444323 |
| concepts[9].level | 1 |
| concepts[9].score | 0.12739112973213196 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[9].display_name | Theoretical computer science |
| concepts[10].id | https://openalex.org/C134306372 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[10].display_name | Mathematical analysis |
| concepts[11].id | https://openalex.org/C79974875 |
| concepts[11].level | 2 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q483639 |
| concepts[11].display_name | Cloud computing |
| concepts[12].id | https://openalex.org/C33923547 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[12].display_name | Mathematics |
| concepts[13].id | https://openalex.org/C111919701 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[13].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.8535824418067932 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/model-checking |
| keywords[1].score | 0.6093164682388306 |
| keywords[1].display_name | Model checking |
| keywords[2].id | https://openalex.org/keywords/computer-security |
| keywords[2].score | 0.6037600636482239 |
| keywords[2].display_name | Computer security |
| keywords[3].id | https://openalex.org/keywords/security-testing |
| keywords[3].score | 0.5405764579772949 |
| keywords[3].display_name | Security testing |
| keywords[4].id | https://openalex.org/keywords/cyber-physical-system |
| keywords[4].score | 0.5174132585525513 |
| keywords[4].display_name | Cyber-physical system |
| keywords[5].id | https://openalex.org/keywords/domain |
| keywords[5].score | 0.5056374073028564 |
| keywords[5].display_name | Domain (mathematical analysis) |
| keywords[6].id | https://openalex.org/keywords/computer-security-model |
| keywords[6].score | 0.48945558071136475 |
| keywords[6].display_name | Computer security model |
| keywords[7].id | https://openalex.org/keywords/security-information-and-event-management |
| keywords[7].score | 0.28719115257263184 |
| keywords[7].display_name | Security information and event management |
| keywords[8].id | https://openalex.org/keywords/cloud-computing-security |
| keywords[8].score | 0.24822121858596802 |
| keywords[8].display_name | Cloud computing security |
| keywords[9].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[9].score | 0.12739112973213196 |
| keywords[9].display_name | Theoretical computer science |
| language | en |
| locations[0].id | doi:10.1109/access.2021.3081587 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2021.3081587 |
| locations[1].id | pmh:oai:doaj.org/article:51b78b7aba8747179a2385577ce6b022 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Access, Vol 9, Pp 75169-75186 (2021) |
| locations[1].landing_page_url | https://doaj.org/article/51b78b7aba8747179a2385577ce6b022 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5011940704 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9927-106X |
| authorships[0].author.display_name | Ching-Chieh Chan |
| authorships[0].countries | TW |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I92172085 |
| authorships[0].affiliations[0].raw_affiliation_string | Telecommunication Laboratories Chunghwa Telecom Company Ltd., Taoyuan, Taiwan |
| authorships[0].affiliations[1].institution_ids | https://openalex.org/I99908691 |
| authorships[0].affiliations[1].raw_affiliation_string | Yuan-Ze University, Taoyuan, Taiwan |
| authorships[0].institutions[0].id | https://openalex.org/I92172085 |
| authorships[0].institutions[0].ror | https://ror.org/04f786589 |
| authorships[0].institutions[0].type | company |
| authorships[0].institutions[0].lineage | https://openalex.org/I92172085 |
| authorships[0].institutions[0].country_code | TW |
| authorships[0].institutions[0].display_name | Chunghwa Telecom (Taiwan) |
| authorships[0].institutions[1].id | https://openalex.org/I99908691 |
| authorships[0].institutions[1].ror | https://ror.org/01fv1ds98 |
| authorships[0].institutions[1].type | education |
| authorships[0].institutions[1].lineage | https://openalex.org/I99908691 |
| authorships[0].institutions[1].country_code | TW |
| authorships[0].institutions[1].display_name | Yuan Ze University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Ching-Chieh Chan |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Telecommunication Laboratories Chunghwa Telecom Company Ltd., Taoyuan, Taiwan, Yuan-Ze University, Taoyuan, Taiwan |
| authorships[1].author.id | https://openalex.org/A5090023717 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-0046-9645 |
| authorships[1].author.display_name | Cheng‐Zen Yang |
| authorships[1].countries | TW |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I99908691 |
| authorships[1].affiliations[0].raw_affiliation_string | Yuan-Ze University, Taoyuan, Taiwan |
| authorships[1].institutions[0].id | https://openalex.org/I99908691 |
| authorships[1].institutions[0].ror | https://ror.org/01fv1ds98 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I99908691 |
| authorships[1].institutions[0].country_code | TW |
| authorships[1].institutions[0].display_name | Yuan Ze University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Cheng-Zen Yang |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Yuan-Ze University, Taoyuan, Taiwan |
| authorships[2].author.id | https://openalex.org/A5058600495 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-0023-6932 |
| authorships[2].author.display_name | Chin-Feng Fan |
| authorships[2].countries | TW |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I99908691 |
| authorships[2].affiliations[0].raw_affiliation_string | Yuan-Ze University, Taoyuan, Taiwan |
| authorships[2].institutions[0].id | https://openalex.org/I99908691 |
| authorships[2].institutions[0].ror | https://ror.org/01fv1ds98 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I99908691 |
| authorships[2].institutions[0].country_code | TW |
| authorships[2].institutions[0].display_name | Yuan Ze University |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Chin-Feng Fan |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Yuan-Ze University, Taoyuan, Taiwan |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Security Verification for Cyber-Physical Systems Using Model Checking |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10917 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9993000030517578 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2207 |
| primary_topic.subfield.display_name | Control and Systems Engineering |
| primary_topic.display_name | Smart Grid Security and Resilience |
| related_works | https://openalex.org/W343844859, https://openalex.org/W2108147409, https://openalex.org/W2112397448, https://openalex.org/W2017116761, https://openalex.org/W2018644264, https://openalex.org/W88610236, https://openalex.org/W20349581, https://openalex.org/W2883314064, https://openalex.org/W2188404590, https://openalex.org/W1515200046 |
| cited_by_count | 8 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 4 |
| counts_by_year[3].year | 2022 |
| counts_by_year[3].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1109/access.2021.3081587 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2021.3081587 |
| primary_location.id | doi:10.1109/access.2021.3081587 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/9312710/09434411.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2021.3081587 |
| publication_date | 2021-01-01 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2334751341, https://openalex.org/W2951039665, https://openalex.org/W2745105821, https://openalex.org/W2810540089, https://openalex.org/W2981211325, https://openalex.org/W2690638300, https://openalex.org/W6736689689, https://openalex.org/W2033286457, https://openalex.org/W1962072139, https://openalex.org/W2801762003, https://openalex.org/W2911020328, https://openalex.org/W6649490552, https://openalex.org/W2344429718, https://openalex.org/W6661924639, https://openalex.org/W2619874920, https://openalex.org/W2579603034, https://openalex.org/W6624754773, https://openalex.org/W3031523774, https://openalex.org/W6608728664, https://openalex.org/W6645922427, https://openalex.org/W2742724057, https://openalex.org/W3034231873, https://openalex.org/W2494784360, https://openalex.org/W2616333664, https://openalex.org/W3115892855, https://openalex.org/W934626039, https://openalex.org/W3215573479, https://openalex.org/W2605041275, https://openalex.org/W2045554806, https://openalex.org/W219424034, https://openalex.org/W1997146051, https://openalex.org/W1982359930 |
| referenced_works_count | 32 |
| abstract_inverted_index.A | 0 |
| abstract_inverted_index.a | 11, 18, 49, 54, 62, 92, 100, 137, 164, 215 |
| abstract_inverted_index.In | 79 |
| abstract_inverted_index.OT | 66, 181, 223 |
| abstract_inverted_index.as | 74, 161 |
| abstract_inverted_index.at | 179 |
| abstract_inverted_index.be | 88, 190, 230 |
| abstract_inverted_index.by | 67, 124 |
| abstract_inverted_index.in | 143, 232 |
| abstract_inverted_index.is | 42, 167 |
| abstract_inverted_index.it | 41 |
| abstract_inverted_index.of | 25, 34, 48, 61, 91, 115, 157, 251 |
| abstract_inverted_index.on | 10, 65, 108, 174 |
| abstract_inverted_index.or | 7 |
| abstract_inverted_index.so | 73 |
| abstract_inverted_index.to | 44, 75, 87, 103, 169, 195, 209, 219, 237, 246 |
| abstract_inverted_index.we | 83, 98 |
| abstract_inverted_index.(or | 112 |
| abstract_inverted_index.CPS | 19, 117 |
| abstract_inverted_index.The | 155 |
| abstract_inverted_index.and | 118, 148, 245 |
| abstract_inverted_index.are | 160, 203 |
| abstract_inverted_index.but | 29 |
| abstract_inverted_index.can | 135, 149, 189 |
| abstract_inverted_index.for | 57, 140, 192, 241 |
| abstract_inverted_index.may | 3, 229 |
| abstract_inverted_index.not | 21 |
| abstract_inverted_index.our | 80, 158 |
| abstract_inverted_index.the | 23, 31, 35, 46, 58, 89, 109, 116, 175, 180, 184, 197, 221, 226, 233, 239, 248 |
| abstract_inverted_index.(IT) | 28 |
| abstract_inverted_index.CPS, | 63 |
| abstract_inverted_index.CPS. | 50 |
| abstract_inverted_index.This | 51 |
| abstract_inverted_index.also | 30 |
| abstract_inverted_index.each | 141 |
| abstract_inverted_index.life | 6 |
| abstract_inverted_index.more | 153 |
| abstract_inverted_index.only | 22 |
| abstract_inverted_index.then | 119 |
| abstract_inverted_index.they | 202 |
| abstract_inverted_index.this | 206 |
| abstract_inverted_index.thus | 187 |
| abstract_inverted_index.tool | 134 |
| abstract_inverted_index.used | 191, 231 |
| abstract_inverted_index.when | 201 |
| abstract_inverted_index.with | 71, 130, 214 |
| abstract_inverted_index.(OT). | 39 |
| abstract_inverted_index.Thus, | 97 |
| abstract_inverted_index.based | 107, 173 |
| abstract_inverted_index.cyber | 77 |
| abstract_inverted_index.human | 5 |
| abstract_inverted_index.model | 69, 128, 146 |
| abstract_inverted_index.needs | 20 |
| abstract_inverted_index.paper | 52, 207 |
| abstract_inverted_index.state | 142 |
| abstract_inverted_index.these | 121 |
| abstract_inverted_index.using | 68, 127 |
| abstract_inverted_index.(CPS). | 14 |
| abstract_inverted_index.Attack | 217 |
| abstract_inverted_index.First, | 163 |
| abstract_inverted_index.Module | 218 |
| abstract_inverted_index.Third, | 205 |
| abstract_inverted_index.attack | 2 |
| abstract_inverted_index.design | 243 |
| abstract_inverted_index.domain | 32 |
| abstract_inverted_index.level. | 182 |
| abstract_inverted_index.method | 56, 102, 159, 166 |
| abstract_inverted_index.normal | 211 |
| abstract_inverted_index.result | 90 |
| abstract_inverted_index.safety | 110, 113, 177 |
| abstract_inverted_index.search | 139 |
| abstract_inverted_index.system | 13, 212 |
| abstract_inverted_index.unsafe | 85 |
| abstract_inverted_index.Second, | 183 |
| abstract_inverted_index.UPPAAL, | 72 |
| abstract_inverted_index.UPPAAL. | 131 |
| abstract_inverted_index.attack. | 96 |
| abstract_inverted_index.attacks | 200 |
| abstract_inverted_index.augment | 210 |
| abstract_inverted_index.checks) | 114 |
| abstract_inverted_index.deeply. | 154 |
| abstract_inverted_index.enhance | 76, 120 |
| abstract_inverted_index.explore | 150 |
| abstract_inverted_index.further | 249 |
| abstract_inverted_index.overall | 176 |
| abstract_inverted_index.perform | 136 |
| abstract_inverted_index.pollute | 8 |
| abstract_inverted_index.results | 228 |
| abstract_inverted_index.suggest | 247 |
| abstract_inverted_index.twofold | 235 |
| abstract_inverted_index.various | 144 |
| abstract_inverted_index.Finally, | 225 |
| abstract_inverted_index.However, | 15 |
| abstract_inverted_index.attacks. | 224 |
| abstract_inverted_index.checking | 70, 129 |
| abstract_inverted_index.critical | 43 |
| abstract_inverted_index.detailed | 138 |
| abstract_inverted_index.endanger | 4 |
| abstract_inverted_index.focusing | 64 |
| abstract_inverted_index.follows: | 162 |
| abstract_inverted_index.generate | 104, 170 |
| abstract_inverted_index.identify | 45, 196, 238 |
| abstract_inverted_index.modeling | 213 |
| abstract_inverted_index.possible | 145, 198, 242 |
| abstract_inverted_index.proposed | 168 |
| abstract_inverted_index.proposes | 53, 208 |
| abstract_inverted_index.run-time | 193 |
| abstract_inverted_index.security | 59, 81, 95, 105, 122, 125, 171, 185, 199, 252 |
| abstract_inverted_index.simulate | 220 |
| abstract_inverted_index.additions | 250 |
| abstract_inverted_index.analysis, | 82 |
| abstract_inverted_index.attacking | 17 |
| abstract_inverted_index.effective | 94 |
| abstract_inverted_index.following | 234 |
| abstract_inverted_index.generated | 188 |
| abstract_inverted_index.knowledge | 24, 33 |
| abstract_inverted_index.malicious | 1 |
| abstract_inverted_index.operation | 37 |
| abstract_inverted_index.potential | 222 |
| abstract_inverted_index.security. | 78 |
| abstract_inverted_index.suggested | 99, 216 |
| abstract_inverted_index.violated. | 204 |
| abstract_inverted_index.Therefore, | 40 |
| abstract_inverted_index.considered | 84 |
| abstract_inverted_index.monitoring | 194 |
| abstract_inverted_index.simulation | 133 |
| abstract_inverted_index.situations | 86 |
| abstract_inverted_index.systematic | 55, 101, 165 |
| abstract_inverted_index.technology | 27, 38 |
| abstract_inverted_index.constraints | 106, 111, 123, 172, 186 |
| abstract_inverted_index.directions: | 236 |
| abstract_inverted_index.environment | 9 |
| abstract_inverted_index.information | 26 |
| abstract_inverted_index.potentially | 93 |
| abstract_inverted_index.combinations | 147 |
| abstract_inverted_index.constraints. | 253 |
| abstract_inverted_index.improvements | 244 |
| abstract_inverted_index.interactions | 152 |
| abstract_inverted_index.requirements | 178 |
| abstract_inverted_index.successfully | 16 |
| abstract_inverted_index.verification | 60, 126, 227 |
| abstract_inverted_index.contributions | 156 |
| abstract_inverted_index.cyber-physical | 12 |
| abstract_inverted_index.human-computer | 151 |
| abstract_inverted_index.UPPAAL’s | 132 |
| abstract_inverted_index.system’s | 36 |
| abstract_inverted_index.vulnerabilities | 47, 240 |
| cited_by_percentile_year.max | 97 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.75155727 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |