{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T22:09:36Z","timestamp":1770934176554,"version":"3.50.1"},"reference-count":39,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973277"],"award-info":[{"award-number":["61973277"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073292"],"award-info":[{"award-number":["62073292"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LR20F030004"],"award-info":[{"award-number":["LR20F030004"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Control and Decision"],"published-print":{"date-parts":[[2022,10,2]]},"DOI":"10.1080\/23307706.2021.2011792","type":"journal-article","created":{"date-parts":[[2021,12,10]],"date-time":"2021-12-10T16:45:50Z","timestamp":1639154750000},"page":"420-430","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":7,"title":["Secure\n                    <i>H<\/i>\n                    <sub>\u221e<\/sub>\n                    control against time-delay attacks in cyber-physical systems"],"prefix":"10.1080","volume":"9","author":[{"given":"Dan","family":"Jin","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Zhejiang Shuren University","place":["Hangzhou, People's Republic of China"]},{"name":"Zhejiang University of Technology","place":["Hangzhou, People's Republic of China"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mingnan","family":"Hu","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology","place":["Hangzhou, People's Republic of China"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6150-3881","authenticated-orcid":false,"given":"Bo","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology","place":["Hangzhou, People's Republic of China"]}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Yu","sequence":"additional","affiliation":[{"name":"Zhejiang University of Technology","place":["Hangzhou, People's Republic of China"]}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2021,12,10]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.09.019"},{"key":"e_1_3_2_3_1","doi-asserted-by":"crossref","unstructured":"Ali S. Al Balushi T. Nadir Z. & Hussain O. K. (2018). Cyber Security for Cyber Physical Systems (Vol. 768 pp. 11\u201333). Springer.","DOI":"10.1007\/978-3-319-75880-0_2"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2753466"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.9"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4757-5"},{"key":"e_1_3_2_7_1","doi-asserted-by":"crossref","unstructured":"Bianchin G. & Pasqualetti F. (2018). Time-delay attacks in network systems. In Cyber-Physical Systems Security (pp. 157\u2013174). Springer.","DOI":"10.1007\/978-3-319-98935-8_8"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2021.3075198"},{"key":"e_1_3_2_9_1","doi-asserted-by":"crossref","unstructured":"Fan J. Li Z. Jiang Y. Chai T. & Lewis F. L. (2018). Model-free linear discrete-time system H\u221e control using input-output data. 2018 International Conference on Advanced Mechatronic Systems (ICAMechS) (pp. 207\u2013212). IEEE.","DOI":"10.1109\/ICAMechS.2018.8506843"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2850520"},{"key":"e_1_3_2_11_1","article-title":"Electricity grid in US penetrated by spies","volume":"8","author":"Gorman S.","year":"2009","unstructured":"Gorman S. (2009). Electricity grid in US penetrated by spies. The Wall Street Journal, 8.","journal-title":"The Wall Street Journal"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2015.09.017"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.8919"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.2970040"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3049508"},{"key":"e_1_3_2_16_1","doi-asserted-by":"crossref","unstructured":"Jazdi N. (2014 May). Cyber physical systems in the context of Industry 4.0. In 2014 IEEE International Conference on Automation Quality and Testing Robotics (pp. 1\u20134). IEEE.","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.20965\/jaciii.2017.p0251"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.12.009"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/23307706.2018.1522973"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3032598"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.6221021"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2018.06.013"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.v30.1"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2441749"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/acs.v33.2"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(97)00170-2"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2016.2634122"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2568218"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.280789"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.5962385"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2498157"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2586082"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2015.7152667"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/23307706.2014.926624"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2669099"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.6221021"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2489563"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1874-1029(09)60006-9"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2010.10.013"}],"container-title":["Journal of Control and Decision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/23307706.2021.2011792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T21:07:05Z","timestamp":1770930425000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23307706.2021.2011792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,10]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,10,2]]}},"alternative-id":["10.1080\/23307706.2021.2011792"],"URL":"https:\/\/doi.org\/10.1080\/23307706.2021.2011792","relation":{},"ISSN":["2330-7706","2330-7714"],"issn-type":[{"value":"2330-7706","type":"print"},{"value":"2330-7714","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,10]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjcd20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjcd20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-03-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}