{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:23:03Z","timestamp":1764688983713,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/acc.2014.6859422","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T21:01:49Z","timestamp":1406667709000},"page":"3996-4001","source":"Crossref","is-referenced-by-count":26,"title":["Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control"],"prefix":"10.1109","author":[{"given":"Heng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1109\/TMC.2010.75","article-title":"Optimal jamming attack strategies and network defense policies in wireless sensor networks","volume":"9","author":"li","year":"2010","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.833358"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72709-5_1"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717544"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6425868"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623750"},{"key":"14","doi-asserted-by":"crossref","first-page":"5444","DOI":"10.1109\/CDC.2013.6760746","article-title":"Optimal dos attack policy against remote state estimation","author":"zhang","year":"2013","journal-title":"Proceedings of IEEE Conference on Decision and Control"},{"key":"11","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"Preprints of the 1st Workshop on Secure Control Systems"},{"journal-title":"Modern Communications Jamming Principles and Techniques","year":"2011","author":"poisel","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2006.11.003"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2076569.2076581"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.3088"},{"key":"23","first-page":"2030","article-title":"Sensor data scheduling for linear quadratic gaussian control with full state feedback","author":"shi","year":"2012","journal-title":"Proceedings of American Control Conference"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198537953.001.0001","author":"lancaster","year":"1995","journal-title":"Algebraic Riccati Equations"},{"journal-title":"Networked Sensing Estimation and Control Systems","year":"0","author":"gupta","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2005.1470488"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2035462"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2279896"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2043038"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.09.007"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2286102"},{"key":"5","first-page":"1","article-title":"Research challenges for the security of control systems","author":"ca?rdenas","year":"2008","journal-title":"Proceedings of the 3rd Conference on Hot Topics in Security"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2008.02.001"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"8","article-title":"Online deception attack against remote state estimation","author":"zhang","year":"2014","journal-title":"Proceedings of World Congress of the International Federation of Automatic Control (IFAC)"}],"event":{"name":"2014 American Control Conference - ACC 2014","start":{"date-parts":[[2014,6,4]]},"location":"Portland, OR, USA","end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 American Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6849600\/6858556\/06859422.pdf?arnumber=6859422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T16:01:43Z","timestamp":1717171303000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6859422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/acc.2014.6859422","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}