{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:21:05Z","timestamp":1730204465663,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/ccta.2017.8062609","type":"proceedings-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T16:33:56Z","timestamp":1508862836000},"page":"1123-1128","source":"Crossref","is-referenced-by-count":7,"title":["Manipulative zero-stealthy attacks in cyber-physical systems: Existence space of feasible attack objectives"],"prefix":"10.1109","author":[{"given":"Takumi","family":"Shinohara","sequence":"first","affiliation":[]},{"given":"Toru","family":"Namerikawa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2498708"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185514"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(71)90028-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0339-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1980.1102231"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/87.845876"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364725"},{"key":"ref3","first-page":"56","article-title":"Was Stuxnet an act of war? Decoding a cyberattack","volume":"9","author":"eidler","year":"2011","journal-title":"IEEE Secur Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963264"},{"key":"ref5","first-page":"1396","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"mo","year":"2014","journal-title":"IEEE Trans Control Syst Technol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165689"},{"key":"ref1","first-page":"1287","article-title":"Cyber-Physical systems: A perspective at the centennial","volume":"100","author":"kim","year":"2012","journal-title":"Proc IEEE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514278"}],"event":{"name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2017,8,27]]},"location":"Mauna Lani Resort, HI, USA","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8052581\/8062426\/08062609.pdf?arnumber=8062609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T23:29:52Z","timestamp":1509146992000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8062609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ccta.2017.8062609","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}