{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:32:51Z","timestamp":1729661571258,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/ccta.2017.8062495","type":"proceedings-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T16:33:56Z","timestamp":1508862836000},"page":"402-407","source":"Crossref","is-referenced-by-count":0,"title":["Feedback control systems with cyber fault-management mechanisms: Modeling and tradeoff analysis for simple examples"],"prefix":"10.1109","author":[{"given":"Sandip","family":"Roy","sequence":"first","affiliation":[]},{"given":"Adam","family":"Hahn","sequence":"additional","affiliation":[]},{"given":"Mengran","family":"Xue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"213","article-title":"The myths and facts behind cyber security risks for industrial control systems","volume":"116","author":"eric","year":"2004","journal-title":"Proceedings of the VDE Kongress"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1244533"},{"journal-title":"Safety and Security Features in AUTOSAR","year":"0","author":"nagarjuna rao","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1504\/IJAACS.2009.026785","article-title":"Concepts for run-time and error-resilient control flow checking of embedded RISC CPUs","volume":"2","author":"daniel","year":"2009","journal-title":"International Journal of Autonomous and Adaptive Communications Systems"},{"key":"ref14","first-page":"837","article-title":"The exception handling effectiveness of POSIX operating systems","volume":"26 9","author":"phil","year":"2000","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Feedback control systems with cyber fault-management mechanisms (extended document)","year":"0","author":"sandip","key":"ref15"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCS.2014.2364725","article-title":"Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems","volume":"35","author":"fabio","year":"2015","journal-title":"IEEE Control Systems Magazine"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/JPROC.2006.887288","article-title":"A survey of recent results in networked control systems","volume":"95","author":"joao","year":"2007","journal-title":"Proceedings of the IEEE"},{"key":"ref6","article-title":"Research Challenges for the Security of Control Systems","author":"cardenas","year":"2008","journal-title":"HOTSEC"},{"key":"ref5","first-page":"55","article-title":"Attack models and scenarios for networked control systems","author":"andre","year":"2012","journal-title":"Proceedings of the 1st International Conference on High Confidence Networked Systems"},{"journal-title":"Microprocessor reset with power level detection and watchdog timer","year":"1986","author":"semir","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/MC.2004.52","article-title":"Embedded system security","volume":"37","author":"philip","year":"2004","journal-title":"Computer"},{"key":"ref2","volume":"406","author":"alberto","year":"2010","journal-title":"Networked Control Systems"},{"key":"ref1","first-page":"84","article-title":"Stability of networked control systems","author":"wei","year":"2001","journal-title":"IEEE Control Systems Magazine 21 1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.cose.2006.03.001","article-title":"Security issues in SCADA networks","volume":"25","author":"vinay","year":"2006","journal-title":"Computers and Security"}],"event":{"name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2017,8,27]]},"location":"Mauna Lani Resort, HI, USA","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8052581\/8062426\/08062495.pdf?arnumber=8062495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T23:20:13Z","timestamp":1570231213000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8062495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ccta.2017.8062495","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}