{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:38:39Z","timestamp":1768343919529,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/cca.2016.7587875","type":"proceedings-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T16:50:06Z","timestamp":1476982206000},"page":"474-480","source":"Crossref","is-referenced-by-count":65,"title":["CUSUM and chi-squared attack detection of compromised sensors"],"prefix":"10.1109","author":[{"given":"Carlos","family":"Murguia","sequence":"first","affiliation":[]},{"given":"Justin","family":"Ruths","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"astr\u00f6m","year":"1997","journal-title":"Computer-Controlled Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/41.1-2.100"},{"key":"ref12","author":"ross","year":"2006","journal-title":"Introduction to Probability Models Ninth Edition"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1976.1101300"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-11789-7_11"},{"key":"ref15","author":"van dobben de bruyn","year":"1968","journal-title":"Cumulative Sum Tests Theory and Practice"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(78)90023-X"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/07474948708836130"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/03610919108812948"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1983.10487883"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040293"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2013.6580348"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7170734"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6859155"},{"key":"ref8","author":"gustafsson","year":"2000","journal-title":"Adaptive Filtering and Change Detection"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/1966913.1966959","article-title":"Attacks against process control systems: Risk assessment, detection, and response","author":"c\u00e1rdenas","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/CDC.2016.7798446","article-title":"Characterization of a cusum model-based sensor attack detector","author":"murguia","year":"2016","journal-title":"Decision and Control (CDC) 2016 55th IEEE Conference on"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/59.3.539"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139020411"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3267-7"}],"event":{"name":"2016 IEEE Conference on Control Applications (CCA)","location":"Buenos Aires, Argentina","start":{"date-parts":[[2016,9,19]]},"end":{"date-parts":[[2016,9,22]]}},"container-title":["2016 IEEE Conference on Control Applications (CCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7581720\/7587772\/07587875.pdf?arnumber=7587875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T17:45:06Z","timestamp":1657475106000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7587875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cca.2016.7587875","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}