{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:32:41Z","timestamp":1772908361437,"version":"3.50.1"},"reference-count":37,"publisher":"Informa UK Limited","issue":"6","funder":[{"name":"Technology Innovation Institute (TII), UAE"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Systems Science"],"published-print":{"date-parts":[[2024,4,25]]},"DOI":"10.1080\/00207721.2024.2304127","type":"journal-article","created":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T12:00:42Z","timestamp":1706011242000},"page":"1206-1223","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["A stealthy man-in-the-middle attack strategy for switched systems"],"prefix":"10.1080","volume":"55","author":[{"given":"Dawei","family":"Sun","sequence":"first","affiliation":[{"name":"Sichuan University \u2013 Pittsburgh Institute, Chengdu, Sichuan, People's Republic of China"},{"name":"School of Aeronautics and Astronautics, Purdue University, West Lafayette, IN, USA"}]},{"given":"Inseok","family":"Hwang","sequence":"additional","affiliation":[{"name":"School of Aeronautics and Astronautics, Purdue University, West Lafayette, IN, USA"}]},{"given":"James","family":"Goppert","sequence":"additional","affiliation":[{"name":"Sichuan University \u2013 Pittsburgh Institute, Chengdu, Sichuan, People's Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2024,1,23]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)67757-7"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2007.01.006"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.04.011"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110352"},{"key":"e_1_3_3_7_1","doi-asserted-by":"crossref","unstructured":"Ferrari R. M. & Teixeira A. M. (2017). Detection and isolation of routing attacks through sensor watermarking. In 2017 American control conference (ACC) (pp. 5436\u20135442).","DOI":"10.23919\/ACC.2017.7963800"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3013850"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2017.160047"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3005686"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_3_12_1","unstructured":"Khazraei A. & Pajic M. (2020). Attack-resilient state estimation with intermittent data authentication. arXiv preprint arXiv:2005.08122."},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.09.024"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2761762"},{"key":"e_1_3_3_15_1","doi-asserted-by":"crossref","unstructured":"Kwon C. Liu W. & Hwang I. (2013). Security analysis for cyber-physical systems against stealthy deception attacks. In 2013 American control conference (pp. 3344\u20133349).","DOI":"10.1109\/ACC.2013.6580348"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.029"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2011.04.001"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2573039"},{"issue":"4","key":"e_1_3_3_20_1","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"Mo Y.","year":"2013","unstructured":"Mo, Y., Chabukswar, R., & Sinopoli, B. (2013). Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology, 22(4), 1396\u20131407.","journal-title":"IEEE Transactions on Control Systems Technology"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.06.045"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364725"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3024143"},{"key":"e_1_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-012712-2.50012-3"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110339"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2088690"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364709"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.5165411"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2494521"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.3934\/naco.2019018"},{"key":"e_1_3_3_37_1","doi-asserted-by":"crossref","unstructured":"Weerakkody S. & Sinopoli B. (2016). A moving target approach for identifying malicious sensors in control systems. In 2016 54th annual allerton conference on communication control and computing (allerton) (pp. 1149\u20131156).","DOI":"10.1109\/ALLERTON.2016.7852365"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.6221036"}],"container-title":["International Journal of Systems Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207721.2024.2304127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T22:36:07Z","timestamp":1731105367000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207721.2024.2304127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,23]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,4,25]]}},"alternative-id":["10.1080\/00207721.2024.2304127"],"URL":"https:\/\/doi.org\/10.1080\/00207721.2024.2304127","relation":{},"ISSN":["0020-7721","1464-5319"],"issn-type":[{"value":"0020-7721","type":"print"},{"value":"1464-5319","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,23]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tsys20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tsys20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-06-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-07","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}