{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:08:45Z","timestamp":1730196525138,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/anzcc.2018.8606566","type":"proceedings-article","created":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T22:30:15Z","timestamp":1548282615000},"page":"324-329","source":"Crossref","is-referenced-by-count":1,"title":["Event-based predictive security control for periodic denial-of-service jamming attack"],"prefix":"10.1109","author":[{"given":"Hui","family":"Ge","sequence":"first","affiliation":[]},{"given":"Dong","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Xiang-Peng","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Song","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Song-Lin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/130950951"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2018.2799187"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1016\/j.asoc.2015.01.041","article-title":"Event-triggered controller design of nonlinear discrete-time networked control systems in T-S fuzzy model","volume":"30","author":"hu","year":"2015","journal-title":"Applied Soft Computing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/9.119645"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCS.2014.2364723","article-title":"Covert misappropriation of networked control systems: Presenting a feedback structure","volume":"35","author":"smith","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2416924"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2011.2160543"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2016.7792432"},{"journal-title":"Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems","year":"2007","author":"peng","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and secure networked control systems under denial-of-service attacks","author":"amin","year":"2009","journal-title":"International Conference on Hybrid Systems Computation and Control"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2012.2208967"}],"event":{"name":"2018 Australian & New Zealand Control Conference (ANZCC)","start":{"date-parts":[[2018,12,7]]},"location":"Melbourne, VIC","end":{"date-parts":[[2018,12,8]]}},"container-title":["2018 Australian &amp; New Zealand Control Conference (ANZCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8592610\/8606539\/08606566.pdf?arnumber=8606566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T18:41:26Z","timestamp":1598208086000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8606566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/anzcc.2018.8606566","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}