{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T04:13:48Z","timestamp":1749615228410,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811027406"},{"type":"electronic","value":"9789811027413"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-2741-3_12","type":"book-chapter","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T03:27:31Z","timestamp":1474860451000},"page":"142-153","source":"Crossref","is-referenced-by-count":1,"title":["False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yufeng","family":"Lin","sequence":"first","affiliation":[]},{"given":"Biplob","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Jarvis","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,27]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCS.2014.2364725","volume":"35","author":"F Pasqualetti","year":"2015","unstructured":"Pasqualetti, F., Dorfler, F., Bullo, F.: Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Contr. Syst. 35(1), 110\u2013127 (2015)","journal-title":"IEEE Contr. Syst."},{"issue":"3","key":"12_CR2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: The Proceedings of the 2013 American Control Conference, Washington, DC, pp. 3344\u20133349 (2013)","DOI":"10.1109\/ACC.2013.6580348"},{"issue":"5","key":"12_CR4","doi-asserted-by":"crossref","first-page":"1679","DOI":"10.1109\/TCST.2012.2211874","volume":"21","author":"S Amin","year":"2013","unstructured":"Amin, S., Litrico, X., Sastry, S.S., Bayen, A.M.: Cyber security of water SCADA systems Part II: attack detection using enhanced hydrodynamic models. IEEE Trans. Contr. Syst. Techn. 21(5), 1679\u20131693 (2013)","journal-title":"IEEE Trans. Contr. Syst. Techn."},{"issue":"2","key":"12_CR5","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TSG.2014.2298195","volume":"5","author":"S Sridhar","year":"2014","unstructured":"Sridhar, S., Govindarasu, M.: Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 5(2), 580\u2013591 (2014)","journal-title":"IEEE Trans. Smart Grid"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Eyisi, E., Koutsoukos, X.: Energy-based attack detection in networked control systems. In: HiCoNS, pp. 115\u2013124 (2014)","DOI":"10.1145\/2566468.2566472"},{"issue":"3\u20134","key":"12_CR7","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1080\/03081079.2014.883715","volume":"43","author":"X Ge","year":"2014","unstructured":"Ge, X., Han, Q.-L.: Distributed fault detection over sensor networks with Markovian switching topologies. Int. J. Gen. Syst. 43(3\u20134), 305\u2013318 (2014)","journal-title":"Int. J. Gen. Syst."},{"issue":"10","key":"12_CR8","doi-asserted-by":"crossref","first-page":"1682","DOI":"10.1016\/j.automatica.2010.06.025","volume":"46","author":"B Shen","year":"2010","unstructured":"Shen, B., Wang, Z., Hung, Y.: Distributed $${H}_{\\infty }$$ -consesus filtering in sensor networks with multiple missing measurements: the finite-horizon case. Automatica 46(10), 1682\u20131688 (2010)","journal-title":"Automatica"},{"issue":"10","key":"12_CR9","doi-asserted-by":"crossref","first-page":"2726","DOI":"10.1016\/j.automatica.2012.06.093","volume":"48","author":"P Milln","year":"2012","unstructured":"Milln, P., Orihuela, L., Vivas, C., Rubio, F.: Distributed consensus-based estimation considering network induced delays and dropouts. Automatica 48(10), 2726\u20132729 (2012)","journal-title":"Automatica"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Lin, Y., Han, Q.-L., Yang, F., Jarvis, D.: Event-triggered $${H}_{\\infty }$$ filtering for networked systems based on network dynamics. In: The Proceedings of the 39th Annual Conference of the IEEE Industrial Electronics Society, pp. 5638\u20135643 (2013)","DOI":"10.1109\/IECON.2013.6700058"},{"key":"12_CR11","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.sigpro.2014.09.035","volume":"108","author":"L Ding","year":"2015","unstructured":"Ding, L., Guo, G.: Distributed event-triggered $${H}_{\\infty }$$ consensus filtering in sensor networks. Sig. Process. 108, 365\u2013375 (2015)","journal-title":"Sig. Process."},{"issue":"2","key":"12_CR12","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1109\/TAC.2011.2164734","volume":"57","author":"R Ferrari","year":"2012","unstructured":"Ferrari, R., Parisini, T., Polycarpou, M.: Distributed fault detection and isolation of largescale discrete-time nonlinear systems: an adaptive approximation approach. IEEE Trans. Autom. Control 57(2), 275\u2013290 (2012)","journal-title":"IEEE Trans. Autom. Control"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-2741-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T21:16:27Z","timestamp":1749590187000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-2741-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811027406","9789811027413"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-2741-3_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]}}}