{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:21:02Z","timestamp":1763202062744},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/ccta.2017.8062639","type":"proceedings-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T16:33:56Z","timestamp":1508862836000},"page":"1306-1312","source":"Crossref","is-referenced-by-count":15,"title":["Active detection for exposing intelligent attacks in control systems"],"prefix":"10.1109","author":[{"given":"Sean","family":"Weerakkody","sequence":"first","affiliation":[]},{"given":"Omur","family":"Ozel","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Griffioen","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Sinopoli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/586115.586117"},{"key":"ref32","first-page":"416","article-title":"Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems","author":"ko","year":"2016","journal-title":"2016 IEEE Conference on Communications and Network Security (CNS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852365"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2307\/1911389"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403133"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403134"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3182\/20110828-6-IT-1002.03712"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"ref15","article-title":"To kill a centrifuge: A technical analysis of what Stuxnet's creators tried to achieve","author":"langner","year":"2013","journal-title":"Language & Communication"},{"journal-title":"Control Theory for Linear Systems","year":"2012","author":"trentelman","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7799044"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185514"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/87.845876"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0060-9"},{"key":"ref6","first-page":"90","article-title":"A decoupled feedback structure for covertly appropriating network control systems","author":"smith","year":"2011","journal-title":"IFAC World Congress"},{"key":"ref5","article-title":"False data injection attacks in cyber physical systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"ref29","article-title":"A comparison of controllers for the quadruple tank system","author":"grebeck","year":"1998","journal-title":"Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040293"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039974"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6760152"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2016.7810627"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47560-8_1"},{"journal-title":"Dynamic watermarking for general LTI systems","year":"2017","author":"hespanhol","key":"ref25"}],"event":{"name":"2017 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2017,8,27]]},"location":"Mauna Lani Resort, HI, USA","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8052581\/8062426\/08062639.pdf?arnumber=8062639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T23:28:05Z","timestamp":1509146885000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8062639\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/ccta.2017.8062639","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}