{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:01:35Z","timestamp":1774990895769,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/allerton.2019.8919762","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T04:23:39Z","timestamp":1575606219000},"page":"712-717","source":"Crossref","is-referenced-by-count":42,"title":["Feasibility and Detection of Replay Attack in Networked Constrained Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Mehdi","family":"Hosseinzadeh","sequence":"first","affiliation":[{"name":"Universit&#x00E8; Libre de Bruxelles (ULB),Service d&#x2019;Automatique et d&#x2019;Analyse des Syst&#x00E8;mes (SAAS),Brussels,Belgium"}]},{"given":"Bruno","family":"Sinopoli","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis, St. Louis,Department of Electrical and Systems Engineering,Brussels,Belgium"}]},{"given":"Emanuele","family":"Garone","sequence":"additional","affiliation":[{"name":"Universit&#x00E8; Libre de Bruxelles (ULB),Service d&#x2019;Automatique et d&#x2019;Analyse des Syst&#x00E8;mes (SAAS),Brussels,Belgium"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"mo","year":"2014","journal-title":"IEEE Trans Control Syst Technol"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Syst Mag"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963264"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.01.005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7172286"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.091"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2017.10.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2018.8443035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2906467"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431459"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2284145"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and secure networked control systems under denial-of-service attacks","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2716115"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.96"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"ref20","first-page":"1160","article-title":"Optimal data integrity attack on actuators in cyber-physical systems","author":"wu","year":"2016","journal-title":"Proc IEEE American Control Conf"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(71)90028-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2846365"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2011.08.058"},{"key":"ref23","article-title":"Stochastic model predictive control: State space methods","author":"cannon","year":"2008","journal-title":"Proc 17th IFAC World Congress"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2017.0459"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2018.2889963"}],"event":{"name":"2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","location":"Monticello, IL, USA","start":{"date-parts":[[2019,9,24]]},"end":{"date-parts":[[2019,9,27]]}},"container-title":["2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8911248\/8919648\/08919762.pdf?arnumber=8919762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:52:15Z","timestamp":1774986735000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8919762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/allerton.2019.8919762","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}