{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:51:42Z","timestamp":1773247902697,"version":"3.50.1"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319989341","type":"print"},{"value":"9783319989358","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98935-8_8","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T21:19:26Z","timestamp":1544131166000},"page":"157-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Time-Delay Attacks in Network Systems"],"prefix":"10.1007","author":[{"given":"Gianluca","family":"Bianchin","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Pasqualetti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"8_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/TITS.2014.2328439","volume":"16","author":"M Bernardo di","year":"2015","unstructured":"M. di Bernardo, A. Salvi, S. Santini, Distributed consensus strategy for platooning of vehicles in the presence of time-varying heterogeneous communication delays. IEEE Trans. Intell. Transp. Syst. 16(1), 102\u2013112 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/JPROC.2011.2167449","volume":"100","author":"R Poovendran","year":"2012","unstructured":"R. Poovendran, K. Sampigethaya, S.K.S. Gupta, I. Lee, K.V. Prasad, D. Corman, J.L. Paunicka, Special issue on cyber-physical systems. Proc. IEEE 100(1), 6\u201312 (2012)","journal-title":"Proc. IEEE"},{"key":"8_CR3","first-page":"73","volume-title":"Lessons learned from the Maroochy water breach, in International Conference on Critical Infrastructure Protection","author":"J Slay","year":"2007","unstructured":"J. Slay, M. Miller, Lessons learned from the Maroochy water breach, in International Conference on Critical Infrastructure Protection (Springer, Berlin, 2007), pp. 73\u201382"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/00396338.2011.555586","volume":"53","author":"JP Farwell","year":"2011","unstructured":"J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23\u201340 (2011)","journal-title":"Survival"},{"key":"8_CR5","first-page":"355","volume-title":"Attacks against process control systems: risk assessment, detection, and response, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security","author":"AA C\u00e1rdenas","year":"2011","unstructured":"A.A. C\u00e1rdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, S. Sastry, Attacks against process control systems: risk assessment, detection, and response, in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ACM, New York, 2011), pp. 355\u2013366"},{"issue":"11","key":"8_CR6","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"F. Pasqualetti, F. D\u00f6rfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715\u20132729 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"J.K. Hale, E.F. Infante, F.-S.P. Tsen, Stability in linear delay equations. DTIC Document, Tech. Rep., 1982","DOI":"10.21236\/ADA129264"},{"issue":"3","key":"8_CR8","doi-asserted-by":"publisher","first-page":"4837","DOI":"10.3390\/s150304837","volume":"15","author":"EA Lee","year":"2015","unstructured":"E.A. Lee, The past, present and future of cyber-physical systems: a focus on models. Sensors 15(3), 4837\u20134869 (2015)","journal-title":"Sensors"},{"issue":"9","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1109\/TAC.2004.834113","volume":"49","author":"R Olfati-Saber","year":"2004","unstructured":"R. Olfati-Saber, R.M. Murray, Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Control 49(9), 1520\u20131533 (2004)","journal-title":"IEEE Trans. Autom. Control"},{"key":"8_CR10","first-page":"4922","volume-title":"Consensus under communication delays, in 47th IEEE Conference on Decision and Control, CDC 2008","author":"A Seuret","year":"2008","unstructured":"A. Seuret, D.V. Dimarogonas, K.H. Johansson, Consensus under communication delays, in 47th IEEE Conference on Decision and Control, CDC 2008 (IEEE, Piscataway, 2008), pp. 4922\u20134927"},{"issue":"4","key":"8_CR11","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/S0167-6911(01)00108-6","volume":"43","author":"P-A Bliman","year":"2001","unstructured":"P.-A. Bliman, LMI characterization of the strong delay-independent stability of linear delay systems via quadratic Lyapunov\u2013Krasovskii functionals. Syst. Control Lett. 43(4), 263\u2013274 (2001)","journal-title":"Syst. Control Lett."},{"issue":"8","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1109\/9.618244","volume":"42","author":"X Li","year":"1997","unstructured":"X. Li, C.E. De Souza, Delay-dependent robust stability and stabilization of uncertain linear delay systems: a linear matrix inequality approach. IEEE Trans. Autom. Control 42(8), 1144\u20131148 (1997)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"4","key":"8_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1093\/imamci\/15.4.331","volume":"15","author":"S-I Niculescu","year":"1998","unstructured":"S.-I. Niculescu, Stability and hyperbolicity of linear systems with delayed state: a matrix-pencil approach. IMA J. Math. Control Inf. 15(4), 331\u2013347 (1998)","journal-title":"IMA J. Math. Control Inf."},{"key":"8_CR14","first-page":"433","volume-title":"A new method for computing delay margins for stability of linear delay systems, in Proceedings of the 33rd IEEE Conference on Decision and Control,","author":"J Chen","year":"1994","unstructured":"J. Chen, G. Gu, C.N. Nett, A new method for computing delay margins for stability of linear delay systems, in Proceedings of the 33rd IEEE Conference on Decision and Control, vol. 1 (IEEE, Piscataway, 1994), pp. 433\u2013437"},{"key":"8_CR15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/2461446.2461460","volume-title":"Minimax control for cyber-physical systems under network packet scheduling attacks, in Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems","author":"Y Shoukry","year":"2013","unstructured":"Y. Shoukry, J. Araujo, P. Tabuada, M. Srivastava, K.H. Johansson, Minimax control for cyber-physical systems under network packet scheduling attacks, in Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (ACM, New York, 2013), pp. 93\u2013100"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.automatica.2015.06.019","volume":"59","author":"J Moon","year":"2015","unstructured":"J. Moon, T. Ba\u015far, Minimax control over unreliable communication channels. Automatica 59, 182\u2013193 (2015)","journal-title":"Automatica"},{"key":"8_CR17","first-page":"1898","volume-title":"Secure state estimation for cyber physical systems with sparse malicious packet drops, in American Control Conference (ACC)","author":"G Fiore","year":"2017","unstructured":"G. Fiore, Y.H. Chang, Q. Hu, M.D. Di Benedetto, C.J. Tomlin, Secure state estimation for cyber physical systems with sparse malicious packet drops, in American Control Conference (ACC) (IEEE, Piscataway, 2017), pp. 1898\u20131903"},{"key":"8_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-015-5","volume-title":"Distributed Consensus in Multi-Vehicle Cooperative Control","author":"W Ren","year":"2008","unstructured":"W. Ren, R.W. Beard, Distributed Consensus in Multi-Vehicle Cooperative Control (Springer, Berlin, 2008)"},{"issue":"11","key":"8_CR19","doi-asserted-by":"publisher","first-page":"2715","DOI":"10.1109\/TAC.2013.2266831","volume":"58","author":"F Pasqualetti","year":"2013","unstructured":"F. Pasqualetti, F. D\u00f6rfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715\u20132729 (2013)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"8_CR20","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/JPROC.2006.887288","volume":"95","author":"JP Hespanha","year":"2007","unstructured":"J.P. Hespanha, P. Naghshtabrizi, Y. Xu, A survey of recent results in networked control systems. Proc. IEEE 95(1), 138\u2013162 (2007)","journal-title":"Proc. IEEE"},{"issue":"6","key":"8_CR21","doi-asserted-by":"publisher","first-page":"2138","DOI":"10.1137\/050641223","volume":"45","author":"W Michiels","year":"2007","unstructured":"W. Michiels, S.-I. Niculescu, Characterization of delay-independent stability and delay interference phenomena. SIAM J. Control Optim. 45(6), 2138\u20132155 (2007)","journal-title":"SIAM J. Control Optim."},{"key":"8_CR22","volume-title":"Matrix rank minimization with applications","author":"M Fazel","year":"2002","unstructured":"M. Fazel, Matrix rank minimization with applications, Ph.D. dissertation, Stanford University, 2002"},{"key":"8_CR23","unstructured":"M. Jaggi, M. Sulovsk, et al., A simple algorithm for nuclear norm regularized problems, in Proceedings of the 27th International Conference on Machine Learning (ICML-10) (2010), pp. 471\u2013478"},{"key":"8_CR24","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P Erd\u00f6s","year":"1959","unstructured":"P. Erd\u00f6s, A. R\u00e9nyi, On random graphs, I. Publ. Math. Debr. 6, 290\u2013297 (1959)","journal-title":"I. Publ. Math. Debr."}],"container-title":["Cyber-Physical Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98935-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T22:13:52Z","timestamp":1694470432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98935-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319989341","9783319989358"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98935-8_8","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}