{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:37:57Z","timestamp":1761763077774,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/ccta41146.2020.9206295","type":"proceedings-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T20:39:12Z","timestamp":1601411952000},"page":"726-731","source":"Crossref","is-referenced-by-count":12,"title":["Monitoring and Detection of Malicious Adversarial Zero Dynamics Attacks in Cyber-Physical Systems"],"prefix":"10.1109","author":[{"given":"Amir","family":"Baniamerian","sequence":"first","affiliation":[]},{"given":"Khashayar","family":"Khorasani","sequence":"additional","affiliation":[]},{"given":"Nader","family":"Meskin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"New approaches to smart grid security with SCADA systems","year":"2014","author":"tang","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCS.2014.2364725","article-title":"Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems","volume":"35","author":"pasqualetti","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2015.08.004"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SOSCYPS.2016.7580001"},{"journal-title":"Toward cyber-secure and resilient networked control systems","year":"2014","author":"teixeira","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC40024.2019.9029298"},{"journal-title":"A security index for actuators based on perfect undetectability Properties and approximation","year":"2018","author":"milosevic","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263846"},{"key":"ref4","first-page":"1287","article-title":"Cyber-physical systems: A perspective at the centennial","volume":"100","author":"kim","year":"2012","journal-title":"Centennial Special Issue"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2011.11.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PES.2008.4596708"},{"key":"ref5","article-title":"Science and engineering of cyber-physical systems (dagstuhl seminar 11441)","author":"giese","year":"2012","journal-title":"CSL Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2514\/6.2013-4809"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048026"},{"journal-title":"Optimal Mobile Sensing and Actuation Policies in Cyber-physical Systems","year":"2011","author":"tricaud","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2017.2709310"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524932"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1969.1099133"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0339-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/9.16422"},{"journal-title":"A geometric approach to failure detection and identification in linear systems","year":"1986","author":"massoumnia","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/87.845876"}],"event":{"name":"2020 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,8,26]]}},"container-title":["2020 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200884\/9206152\/09206295.pdf?arnumber=9206295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:48:53Z","timestamp":1656330533000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ccta41146.2020.9206295","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}