{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:56:48Z","timestamp":1730195808894,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/allerton.2018.8635873","type":"proceedings-article","created":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T03:04:31Z","timestamp":1551409471000},"page":"290-296","source":"Crossref","is-referenced-by-count":1,"title":["Communication Link Elimination in Static LQG Teams"],"prefix":"10.1109","author":[{"given":"Jiacheng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on scada systems","volume":"22","author":"mo","year":"2014","journal-title":"IEEE Transactions on Control Systems Technology"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120187"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1109\/TSG.2011.2161892","article-title":"Integrity data attacks in power market operations","volume":"2","author":"xie","year":"2011","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431752"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717544"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426869"},{"journal-title":"Matrix Mathematics Theory Facts and Formulas With Application to Linear Systems Theory","year":"2005","author":"bernstein","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2018.2851152"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2765-4","author":"flury","year":"1997","journal-title":"A First Course in Multivariate Statistics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403296"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245673"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997527"},{"key":"ref8","article-title":"Car hacking just got real: in experiment, hackers disable suv on busy highway","author":"miller","year":"2015","journal-title":"The Washington Post"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1109\/ICCVE.2014.7297695","article-title":"Standardization challenges for safety and security of connected, automated and intelligent vehicles","author":"schmittner","year":"2014","journal-title":"Connected Vehicles and Expo (ICCVE) 2014 International Conference on"},{"key":"ref2","first-page":"263","article-title":"Low-latency cryptographic protection for scada communications","author":"wright","year":"1997","journal-title":"ACNS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7413993"},{"journal-title":"Common Cybersecurity Vulnerabilities in Industrial Control Systems","year":"2009","key":"ref1"},{"key":"ref20","first-page":"4072","article-title":"One-stage control over an adversarial channel with finite code length","author":"gupta","year":"2011","journal-title":"50th IEEE Conference on Decision and Control (CDC)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2011.02.001"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MCS.2014.2364710","article-title":"Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems","volume":"35","author":"zhu","year":"2015","journal-title":"IEEE Control Systems Magazine"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1971.271022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704455"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(92)90321-Z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898717907"}],"event":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2018,10,2]]},"location":"Monticello, IL, USA","end":{"date-parts":[[2018,10,5]]}},"container-title":["2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8630872\/8635635\/08635873.pdf?arnumber=8635873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:07:02Z","timestamp":1598224022000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8635873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/allerton.2018.8635873","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}