{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T09:20:52Z","timestamp":1769937652331,"version":"3.49.0"},"reference-count":38,"publisher":"Informa UK Limited","issue":"13","funder":[{"name":"National Science Foundation","award":["ECCS-EPCN-2241718"],"award-info":[{"award-number":["ECCS-EPCN-2241718"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Systems Science"],"published-print":{"date-parts":[[2024,10,2]]},"DOI":"10.1080\/00207721.2024.2351056","type":"journal-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T02:52:10Z","timestamp":1716259930000},"page":"2759-2770","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["A Lyapunov-based control design for centralised networked control systems under false-data-injection attacks"],"prefix":"10.1080","volume":"55","author":[{"given":"Arman","family":"Sargolzaei","sequence":"first","affiliation":[{"name":"Department of Mechanical Engineering, University of South Florida College of Engineering, Tampa, FL, USA"}]}],"member":"301","published-online":{"date-parts":[[2024,5,20]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2016.11.005"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2017.2774202"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.9424"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/cth2.v10.12"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2386305"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSC61021.2023.10354110"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963210"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.80265"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2470218"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2012.6315102"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/cps2.v2.4"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102324"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703842"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357357"},{"issue":"2","key":"e_1_3_4_16_1","first-page":"261","article-title":"Switched Stackelberg game analysis of false data injection attacks on networked control systems","volume":"56","author":"Huang Y.","year":"2020","unstructured":"Huang, Y., & Zhao, J. (2020). Switched Stackelberg game analysis of false data injection attacks on networked control systems. Kybernetika, 56(2), 261\u2013277.","journal-title":"Kybernetika"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2017.2751661"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.5165411"},{"issue":"2","key":"e_1_3_4_19_1","first-page":"697","article-title":"Immunity toward data-injection attacks using multisensor track fusion-based model prediction","volume":"8","author":"Khalid H. M.","year":"2017","unstructured":"Khalid, H. M., & Peng, J. C.-H. (2017). Immunity toward data-injection attacks using multisensor track fusion-based model prediction. IEEE Transactions on Smart Grid, 8(2), 697\u2013707.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622045"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.376055"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2798817"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2357531"},{"issue":"1","key":"e_1_3_4_26_1","first-page":"489","article-title":"Security analysis of networked control systems under false data injection attacks: Challenges and solutions","volume":"7","author":"Nguyen A.","year":"2020","unstructured":"Nguyen, A., & Lee, B. (2020). Security analysis of networked control systems under false data injection attacks: Challenges and solutions. IEEE Transactions on Control of Network Systems, 7(1), 489\u2013501.","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.5962385"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2535119"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/ACC50511.2021.9482950"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74412-4_6"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34094-0_10"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3106009"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.9424"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.1000141"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2166314"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3131145"},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607701"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2382714"},{"issue":"1","key":"e_1_3_4_39_1","first-page":"246","article-title":"An optimal combining attack strategy against economic dispatch of integrated energy system","volume":"70","author":"Zhang Y.","year":"2022","unstructured":"Zhang, Y., Xie, X., Fu, W., Chen, X., Hu, S., Zhang, L., & Xia, Y. (2022). An optimal combining attack strategy against economic dispatch of integrated energy system. IEEE Transactions on Circuits and Systems II: Express Briefs, 70(1), 246\u2013250.","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"}],"container-title":["International Journal of Systems Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207721.2024.2351056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T16:55:49Z","timestamp":1727196949000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207721.2024.2351056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":38,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2024,10,2]]}},"alternative-id":["10.1080\/00207721.2024.2351056"],"URL":"https:\/\/doi.org\/10.1080\/00207721.2024.2351056","relation":{},"ISSN":["0020-7721","1464-5319"],"issn-type":[{"value":"0020-7721","type":"print"},{"value":"1464-5319","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tsys20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tsys20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}