{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:23:28Z","timestamp":1725600208246},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/ccta41146.2020.9206284","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:39:12Z","timestamp":1601426352000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Multi-Model Resilient Observer under False Data Injection Attacks"],"prefix":"10.1109","author":[{"given":"Olugbenga Moses","family":"Anubi","sequence":"first","affiliation":[]},{"given":"Charalambos","family":"Konstantinou","sequence":"additional","affiliation":[]},{"given":"Carlos A.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Satish","family":"Vedula","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0142-0615(90)90005-V"},{"journal-title":"Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems","year":"2004","author":"scholtz","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2596298"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2924246"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"journal-title":"Secure state estimation for nonlinear power systems under cyber attacks","year":"2016","author":"hu","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963229"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2019.2952357"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282993"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1491"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCTA.2017.8062642"},{"journal-title":"Robust resilient signal reconstruction under adversarial attacks","year":"2018","author":"anubi","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2495133"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2288639"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2475695"},{"journal-title":"Resilient optimal estimation using measurement prior","year":"2019","author":"anubi","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2614396"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2017.0033"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2994487.2994491"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2017.2669110"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT45199.2020.9087789"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2015.7138763"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858979"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2016.2643239"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2016.01.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.801410"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0437847100"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.834793"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820031"}],"event":{"name":"2020 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,8,26]]}},"container-title":["2020 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200884\/9206152\/09206284.pdf?arnumber=9206284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:15:42Z","timestamp":1656346542000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ccta41146.2020.9206284","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}