{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:06:24Z","timestamp":1729634784781,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/allerton.2014.7028577","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T19:24:07Z","timestamp":1423164247000},"page":"1093-1101","source":"Crossref","is-referenced-by-count":3,"title":["A unifying approach for the identification of application-driven stealthy attacks on mobile CPS"],"prefix":"10.1109","author":[{"given":"Vu","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]},{"given":"George","family":"Atia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001","author":"bonabeau","year":"1999","journal-title":"Swarm Intelligence From Natural to Artificial Systems"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2010.2050586"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2068576"},{"key":"36","first-page":"312","article-title":"Adaptive bases for reinforcement learning","author":"di castro","year":"2010","journal-title":"Machine Learning and Knowledge Discovery in Databases"},{"key":"18","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1145\/1082473.1082610","article-title":"Performance of digital pheromones for swarming vehicle control","author":"sauter","year":"2005","journal-title":"Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems ACM"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/s11768-011-1005-3"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"34","volume":"18","author":"sutton","year":"1988","journal-title":"Reinforcement Learning"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1400751.1400759"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ADPRL.2009.4927528"},{"key":"11","article-title":"Intelligent Jamming in Wireless Networks with Applications to 802.11b and other Networks","author":"thuente","year":"2006","journal-title":"Proceedings of IEEE MILCOM"},{"key":"38","article-title":"Neuro-dynamic programming","author":"bertsekas","year":"1996","journal-title":"Athena Scientific"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062185"},{"journal-title":"Control Systems Security Program (CSSP)","year":"0","key":"21"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1049\/ip-cta:20050178","article-title":"Networked control system: A brief survey","volume":"153","author":"yang","year":"2006","journal-title":"IEE Proceedings Control Theory and Applications"},{"journal-title":"Critical Infrastructure Protection Multiple Efforts to Secure Control Systems Are under Way but Challenges Remain","year":"0","key":"22"},{"key":"23","article-title":"Research Challenges for the Security of control Systems","author":"c\ufffdrdenas","year":"2008","journal-title":"Proceedings of the 3rd USENIX Workshop on Hot Topics in Security"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"26","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1966913.1966959","article-title":"Attacks against process control systems: Risk assessment, detection and response","author":"c\ufffdrdenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ACM"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"28","first-page":"3690","article-title":"Networked Control Systems under Cyber Attacks with Applications to Power Networks","author":"andr\ufffd teixeira","year":"2010","journal-title":"the 1999 American Control Conference (Cat No 99CH36251) ACC-99"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIC.2006.008645"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834121"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2006.1637931"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2013.6692769"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2013.6523861"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2002.1184678"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"32","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7432.001.0001","author":"getoor","year":"2007","journal-title":"Introduction to Statistical Relational Learning"},{"key":"5","article-title":"Stabilization of networked control systems with data packet dropout and network delays via switching system approach","author":"yu","year":"2004","journal-title":"Proceedings of the IEEE Conference on Decision and Control"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1512\/iumj.1957.6.56038"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2003.820140"},{"key":"9","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/j.automatica.2006.10.023","article-title":"Stability of kalman filtering with markovian packet losses","volume":"43","author":"huang","year":"2007","journal-title":"Automatica"},{"journal-title":"Real-time control systems with delays","year":"1998","author":"nillson","key":"8"}],"event":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2014,9,30]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2014,10,3]]}},"container-title":["2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008053\/7028426\/07028577.pdf?arnumber=7028577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T18:31:19Z","timestamp":1651170679000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7028577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/allerton.2014.7028577","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}