{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:32:11Z","timestamp":1743121931564,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319011585"},{"type":"electronic","value":"9783319011592"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-01159-2_11","type":"book-chapter","created":{"date-parts":[[2013,6,29]],"date-time":"2013-06-29T11:16:29Z","timestamp":1372504589000},"page":"197-216","source":"Crossref","is-referenced-by-count":11,"title":["Resilient Parameter-Invariant Control with Application to Vehicle Cruise Control"],"prefix":"10.1007","author":[{"given":"James","family":"Weimer","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Bezzo","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]},{"given":"George J.","family":"Pappas","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/0005-1098(76)90041-8","volume":"12","author":"A. Willsky","year":"1976","unstructured":"Willsky, A.: A survey of design methods for failure detection in dynamic systems. Automatica\u00a012, 601\u2013611 (1976)","journal-title":"Automatica"},{"key":"11_CR2","volume-title":"Essentials of robust control","author":"K. Zhou","year":"1998","unstructured":"Zhou, K., Doyle, J.C.: Essentials of robust control. Prentice-Hall, Englewood Cliffs (1998) ISBN: 0-13-790874-1; Qiu, L.: Automatica\u00a038(5), 910\u2013912 (2002)"},{"key":"11_CR3","volume-title":"Adaptive Control","author":"K.J. Astrom","year":"1994","unstructured":"Astrom, K.J., Wittenmark, B.: Adaptive Control, 2nd edn. Addison-Wesley Longman Publishing Co., Inc., Boston (1994)","edition":"2"},{"key":"11_CR4","volume-title":"Detection, Estimation, and Modulation Theory","author":"H.L.V. Trees","year":"1968","unstructured":"Trees, H.L.V.: Detection, Estimation, and Modulation Theory. John Wiley & Sons, Inc., New York (1968)"},{"key":"11_CR5","volume-title":"Statistical Signal Processing, Detection, Estimation, and Time Series Analysis","author":"L.L. Scharf","year":"1991","unstructured":"Scharf, L.L.: Statistical Signal Processing, Detection, Estimation, and Time Series Analysis. Addison-Welsley Publishing Company Inc., Reading (1991)"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/JPROC.2006.887306","volume":"95","author":"L. Schenato","year":"2007","unstructured":"Schenato, L., Sinopoli, B., Franceschetti, M., Poolla, K., Sastry, S.: Foundations of control and estimation over lossy networks. Proceedings of the IEEE\u00a095(1), 163\u2013187 (2007)","journal-title":"Proceedings of the IEEE"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, A., Langbort, C., Basar, T.: Optimal control in the presence of an intelligent jammer with limited actions. In: 2010 49th IEEE Conference on Decision and Control (CDC), pp. 1096\u20131101 (December 2010)","DOI":"10.1109\/CDC.2010.5717544"},{"key":"11_CR8","unstructured":"Pasqualetti, F., D\u00f6rfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems \u2013 part ii: Centralized and distributed monitor design. Technical Report arXiv:1202.6049 (February 2012)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Sundaram, S., Pajic, M., Hadjicostis, C.N., Mangharam, R., Pappas, G.J.: The wireless control network: Monitoring for malicious behavior. In: CDC, pp. 5979\u20135984 (2010)","DOI":"10.1109\/CDC.2010.5717166"},{"key":"11_CR10","first-page":"65","volume-title":"Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS 2012","author":"J. Weimer","year":"2012","unstructured":"Weimer, J., Kar, S., Johansson, K.H.: Distributed detection and isolation of topology attacks in power networks. In: Proceedings of the 1st International Conference on High Confidence Networked Systems, HiCoNS 2012, pp. 65\u201372. ACM, New York (2012)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Weimer, J., Ahmadi, S.A., Araujo, J., Mele, F.M., Papale, D., Shames, I., Sandberg, H., Johansson, K.H.: Active actuator fault detection and diagnostics in hvac systems. In: 4th ACM Workshop on Embedded Systems For Energy-Efficiency in Buildings (BuildSys), Toronto, Canada (2012)","DOI":"10.1145\/2422531.2422551"},{"key":"11_CR12","unstructured":"Fawzi, H., Tabuada, P., Diggavi, S.N.: Secure estimation and control for cyber-physical systems under adversarial attacks. CoRR abs\/1205.5073 (2012)"},{"issue":"11","key":"11_CR13","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/9.333769","volume":"39","author":"R. Pintelon","year":"1994","unstructured":"Pintelon, R., Guillaume, P., Rolain, Y., Schoukens, J.: Parametric identification of transfer functions in the frequency domain-a survey. IEEE Transactions on Automatic Control\u00a039(11), 2245\u20132260 (1994)","journal-title":"IEEE Transactions on Automatic Control"},{"key":"11_CR14","volume-title":"System identification: theory for the user","year":"1999","unstructured":"Ljung, L. (ed.): System identification: theory for the user, 2nd edn. Prentice Hall PTR, Upper Saddle River (1999)","edition":"2"},{"issue":"12","key":"11_CR15","doi-asserted-by":"publisher","first-page":"1751","DOI":"10.1016\/0005-1098(95)00094-X","volume":"31","author":"P. Van Den Hof","year":"1995","unstructured":"Van Den Hof, P.: Identification and control - closed-loop issues. Automatica\u00a031(12), 1751\u20131770 (1995)","journal-title":"Automatica"}],"container-title":["Lecture Notes in Control and Information Sciences","Control of Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-01159-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T03:22:32Z","timestamp":1674876152000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-01159-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319011585","9783319011592"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-01159-2_11","relation":{},"ISSN":["0170-8643","1610-7411"],"issn-type":[{"type":"print","value":"0170-8643"},{"type":"electronic","value":"1610-7411"}],"subject":[],"published":{"date-parts":[[2013]]}}}