{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:59:35Z","timestamp":1729670375104,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/allerton.2016.7852363","type":"proceedings-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T21:38:11Z","timestamp":1487021891000},"page":"1137-1141","source":"Crossref","is-referenced-by-count":1,"title":["Secure system identification"],"prefix":"10.1109","author":[{"given":"Mehrdad","family":"Showkatbakhsh","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Tabuada","sequence":"additional","affiliation":[]},{"given":"Suhas","family":"Diggavi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2012","author":"howes","journal-title":"Modern Analysis and Topology","key":"ref31"},{"year":"1987","author":"ljung","journal-title":"System Identification Theory for the User","key":"ref30"},{"key":"ref10","article-title":"A jamming-resilient algorithm for self-triggered network coordination","author":"senejohnny","year":"2016","journal-title":"arXiv preprint arXiv 1603 02895"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CDC.2010.5717544"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/MCS.2014.2364723"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CDC.2010.5718158"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TAC.2014.2303233"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MCS.2014.2364709"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ACC.2015.7171098"},{"key":"ref17","first-page":"2439","article-title":"Smt-based observer design for cyber physical systems under sensor attacks","author":"shoukry","year":"2015","journal-title":"American Control Conference (ACC)"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ICCPS.2014.6843720"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TAC.2014.2350231"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1137\/1.9780898718263"},{"key":"ref4","article-title":"Research challenges for the security of control systems","author":"c\u00e1rdenas","year":"2008","journal-title":"HOTSEC"},{"year":"2006","author":"antsaklis","journal-title":"Linear Systems","key":"ref27"},{"year":"2016","author":"kelion","article-title":"Nissan leaf electric cars hack vulnerability disclosed","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MNET.2013.6423187"},{"year":"2012","author":"van overschee","journal-title":"Subspace Identification for Linear Systems Theory-Implementation-Applications","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CDC.2010.5717166"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TAC.2013.2279896"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"year":"0","author":"greenberg","article-title":"Hackers remotely kill a jeep on the highway, with me in it","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TAC.2015.2416924"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MSP.2011.67"},{"key":"ref20","article-title":"Event-triggered state observers for sparse sensor noise\/attacks","author":"shoukry","year":"2013","journal-title":"IEEE Transactions on Automatic Control"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TAC.2013.2266831"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TSP.2013.2284145"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ISIT.2015.7282993"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/CDC.2015.7403027"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/CDC.2016.7799376"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/2566468.2566483"}],"event":{"name":"2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2016,9,27]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2016,9,30]]}},"container-title":["2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7819723\/7852197\/07852363.pdf?arnumber=7852363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T10:27:21Z","timestamp":1498386441000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7852363\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/allerton.2016.7852363","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}