{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:11:51Z","timestamp":1725671511088},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/acc.2014.6859001","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T17:01:49Z","timestamp":1406653309000},"page":"1716-1722","source":"Crossref","is-referenced-by-count":10,"title":["Finite energy and bounded attacks on control system sensor signals"],"prefix":"10.1109","author":[{"given":"Seddik M.","family":"Djouadi","sequence":"first","affiliation":[]},{"given":"Alexander M.","family":"Melin","sequence":"additional","affiliation":[]},{"given":"Erik M.","family":"Ferragut","sequence":"additional","affiliation":[]},{"given":"Jason A.","family":"Laska","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Dong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Attack Detection and Identification in Cyber-physical Systems Part I Models and Fundamental Limitations","year":"2012","author":"pasqualetti","key":"19"},{"journal-title":"Linear Robust Control","year":"1995","author":"green","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623743"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.925826"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/FIIW.2012.6378329"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5685223"},{"key":"15","article-title":"America's hackable backbone","author":"greenberg","year":"2007","journal-title":"Forbes"},{"journal-title":"Robust and Optimal Control","year":"1995","author":"zhou","key":"34"},{"key":"16","article-title":"Critical infrastructure protection. Multiple efforts to secure control systems are under way, but challenges remain. Technical report GAO-07-1036","author":"office","year":"2007","journal-title":"Technical Report GAO-07-1036 Tech Rep"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"14","article-title":"Roadmap to secure control systems in the energy sector","author":"eisenhauer","year":"2006","journal-title":"Energetics Incorporated Sponsored by the U S Department of Energy and the U S Department of Homeland Security"},{"journal-title":"Power System Dynamics Stability and Control","year":"2008","author":"machowski","key":"37"},{"journal-title":"Global Energy Attacks Night","year":"2011","author":"services","key":"11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102367"},{"journal-title":"Kaspersky Lab and Itu Research Reveals New Advanced Cyber Threat","year":"2012","key":"12"},{"key":"21","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"22","article-title":"Key establishment via common state information in networked","author":"li","year":"2011","journal-title":"Proceedings of the American Control Conference"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.1996.558870"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"27","article-title":"Secure control against replay attacks","author":"mo","year":"2010","journal-title":"Conference on Communication Control and Computing"},{"key":"28","article-title":"A decoupled feedback structure for covertly appropriating network control systems","author":"smith","year":"2011","journal-title":"IFAC World Congress"},{"key":"29","article-title":"Stackelberg-game analysis of correlated attacks in cyber-physical systems","author":"zhu","year":"2011","journal-title":"American Control Conference"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"2","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"journal-title":"W32 stuxnet Dossier","year":"2011","author":"falliere","key":"10"},{"key":"1","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"2008","journal-title":"3rd USENIX Workshop on Hot Topics in Security (HotSec'08) Associated with the 17th USENIX Security Symposium"},{"key":"30","article-title":"Combating false reports for secure networked control in smart grid","author":"li","year":"2011","journal-title":"Proc of the IEEE International Conference in Communications (ICC)"},{"key":"7","article-title":"Experts hack power grid in no time","author":"greene","year":"2008","journal-title":"Network"},{"key":"6","article-title":"Hackers cut cities' power","author":"greenberg","year":"2008","journal-title":"Forbes"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161031"},{"key":"5","article-title":"Teen derails tram after hacking train network","author":"leyden","year":"2008","journal-title":"The Register"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2009.5091051"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7225(99)00061-0"},{"key":"9","article-title":"Tva needs to address weaknesses in control systems and networks","author":"security","year":"2008","journal-title":"Tech Rep GAO-08-526 Report to Congressional Requesters Tech Rep"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.31"}],"event":{"name":"2014 American Control Conference - ACC 2014","start":{"date-parts":[[2014,6,4]]},"location":"Portland, OR, USA","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 American Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849600\/6858556\/06859001.pdf?arnumber=6859001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:01:14Z","timestamp":1490281274000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859001\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/acc.2014.6859001","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}