{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:57:29Z","timestamp":1726037849292},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242015"},{"type":"electronic","value":"9783030242022"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24202-2_3","type":"book-chapter","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T06:02:44Z","timestamp":1563861764000},"page":"28-38","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bio-inspired System Identification Attacks in Noisy Networked Control Systems"],"prefix":"10.1007","author":[{"given":"Alan Oliveira","family":"de S\u00e1","sequence":"first","affiliation":[]},{"given":"Ant\u00f3nio","family":"Casimiro","sequence":"additional","affiliation":[]},{"given":"Raphael Carlos Santos","family":"Machado","sequence":"additional","affiliation":[]},{"given":"Luiz Fernando Rust","family":"da Costa Carmo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"issue":"5","key":"3_CR1","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TCST.2012.2211873","volume":"21","author":"S Amin","year":"2013","unstructured":"Amin, S., Litrico, X., Sastry, S., Bayen, A.M.: Cyber security of water SCADA systems Part I: analysis and experimentation of stealthy deception attacks. IEEE Trans. Control Syst. Technol. 21(5), 1963\u20131970 (2013)","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"15","key":"3_CR2","first-page":"8121","volume":"219","author":"P Civicioglu","year":"2013","unstructured":"Civicioglu, P.: Backtracking search optimization algorithm for numerical optimization problems. Appl. Math. Comput. 219(15), 8121\u20138144 (2013)","journal-title":"Appl. Math. Comput."},{"doi-asserted-by":"crossref","unstructured":"Farooqui, A.A., Zaidi, S.S.H., Memon, A.Y., Qazi, S.: Cyber security backdrop: a scada testbed. In: 2014 IEEE Computing, Communications and IT Applications Conference (ComComAp), pp. 98\u2013103. IEEE (2014)","key":"3_CR3","DOI":"10.1109\/ComComAp.2014.7017178"},{"issue":"6","key":"3_CR4","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.csi.2013.04.003","volume":"35","author":"P Ferrari","year":"2013","unstructured":"Ferrari, P., Flammini, A., Rizzi, M., Sisinni, E.: Improving simulation of wireless networked control systems based on wirelessHART. Comput. Stan. Interfaces 35(6), 605\u2013615 (2013)","journal-title":"Comput. Stan. Interfaces"},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s12555-011-0210-7","volume":"9","author":"K Ji","year":"2011","unstructured":"Ji, K., Wei, D.: Resilient control for wireless networked control systems. Int. J. Control Autom. Syst. 9(2), 285\u2013293 (2011)","journal-title":"Int. J. Control Autom. Syst."},{"issue":"3","key":"3_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/TII.2005.844422","volume":"1","author":"M Long","year":"2005","unstructured":"Long, M., Wu, C.H., Hung, J.Y.: Denial of service attacks on network-based control systems: impact and mitigation. IEEE Trans. Ind. Inform. 1(2), 85\u201396 (2005)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/s13174-017-0074-z","volume":"9","author":"AO S\u00e1 de","year":"2018","unstructured":"de S\u00e1, A.O., da Costa Carmo, L.F., Machado, R.C.: A controller design for mitigation of passive system identification attacks in networked control systems. J. Internet Serv. Appl. 9(1), 2 (2018)","journal-title":"J. Internet Serv. Appl."},{"doi-asserted-by":"crossref","unstructured":"de S\u00e1, A.O., Carmo, L.F.D.C., Machado, R.C.: Bio-inspired active system identification: a cyber-physical intelligence attack in networked control systems. Mobile Netw. Appl., 1\u201314 (2017)","key":"3_CR9","DOI":"10.1007\/s11036-017-0943-5"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1109\/TII.2017.2676005","volume":"13","author":"AO S\u00e1 de","year":"2017","unstructured":"de S\u00e1, A.O., da Costa Carmo, L.F.R., Machado, R.C.: Covert attacks in cyber-physical control systems. IEEE Trans. Ind. Inform. 13(4), 1641\u20131651 (2017)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.3182\/20110828-6-IT-1002.01721","volume":"44","author":"Roy S. Smith","year":"2011","unstructured":"Smith, R.: A decoupled feedback structure for covertly appropriating networked control systems. In: Proceedings of the 18th IFAC World Congress 2011, vol. 18 (2011). IFAC-PapersOnLine","journal-title":"IFAC Proceedings Volumes"},{"issue":"1","key":"3_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MCS.2014.2364723","volume":"35","author":"RS Smith","year":"2015","unstructured":"Smith, R.S.: Covert misappropriation of networked control systems: presenting a feedback structure. IEEE Control Syst. 35(1), 82\u201392 (2015)","journal-title":"IEEE Control Syst."},{"issue":"6","key":"3_CR13","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TNET.2002.804827","volume":"10","author":"AC Snoeren","year":"2002","unstructured":"Snoeren, A.C., et al.: Single-packet IP traceback. IEEE\/ACM Trans. Netw. (ToN) 10(6), 721\u2013734 (2002)","journal-title":"IEEE\/ACM Trans. Netw. (ToN)"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.automatica.2014.10.067","volume":"51","author":"A Teixeira","year":"2015","unstructured":"Teixeira, A., Shames, I., Sandberg, H., Johansson, K.H.: A secure control framework for resource-limited adversaries. Automatica 51, 135\u2013148 (2015)","journal-title":"Automatica"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Bio-inspired Information and Communication Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24202-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T06:03:17Z","timestamp":1563861797000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24202-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242015","9783030242022"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24202-2_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Bio-inspired Information and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pittsburgh, PA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aicon12019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bionetics.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}