{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:38Z","timestamp":1729641638470,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/acc.2015.7171934","type":"proceedings-article","created":{"date-parts":[[2015,7,30]],"date-time":"2015-07-30T21:26:01Z","timestamp":1438291561000},"page":"3874-3879","source":"Crossref","is-referenced-by-count":0,"title":["Secure detection with correlated binary sensors"],"prefix":"10.1109","author":[{"given":"Rohan","family":"Chabukswar","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Sinopoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2004.1347798"},{"key":"ref11","first-page":"2595","article-title":"A game theoretic approach to decision and analysis in network intrusion detection","volume":"3","author":"alpcan","year":"2003","journal-title":"Decision and Control 2003 Proceedings 42nd IEEE Conference on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5991297"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426383"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209210"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9779.2007.00320.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177699803"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176342363"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13167"},{"key":"ref19","article-title":"Secure Detection Using Binary Sensors","author":"chabukswar","year":"2013","journal-title":"4th IFAC Workshop on Distributed Estimation and Control in Networked Systems"},{"key":"ref4","article-title":"Stuxnet under the microscope","author":"matrosov","year":"2010","journal-title":"ESET"},{"journal-title":"Stuxnet Dossier","year":"2011","author":"falliere","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_594"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1002\/0470010940","author":"maronna","year":"2006","journal-title":"Robust Statistics Theory and Methods"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref2","first-page":"6","article-title":"A Silent Attack, But Not A Subtle One","volume":"160","author":"markoff","year":"2010","journal-title":"New York Times"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref9","article-title":"On Security Indices for State Estimators in Power Networks","author":"sandberg","year":"2010","journal-title":"First Workshop on Secure Control Systems Cyber Physical Systems Week 2010"},{"key":"ref20","first-page":"158","article-title":"A Representation of the Joint Distribution of Responses to n Dichotomous Items","author":"bahadur","year":"1961","journal-title":"Studies in Item Analysis and Prediction (Stanford Mathematical Studies in Social Sciences VI)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/85.2.487"},{"key":"ref21","first-page":"302","article-title":"A Method for Generating High-Dimensional Multivariate Binary Variates","volume":"45","author":"emrich","year":"1991","journal-title":"The American Statistician"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2684925"}],"event":{"name":"2015 American Control Conference (ACC)","start":{"date-parts":[[2015,7,1]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2015,7,3]]}},"container-title":["2015 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7160954\/7170700\/07171934.pdf?arnumber=7171934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:44:31Z","timestamp":1498236271000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7171934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/acc.2015.7171934","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}