{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:31:55Z","timestamp":1759332715797,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/ccta41146.2020.9206392","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:39:12Z","timestamp":1601426352000},"page":"857-862","source":"Crossref","is-referenced-by-count":4,"title":["Mitigation and Resiliency of Multi-Agent Systems Subject to Malicious Cyber Attacks on Communication Links"],"prefix":"10.1109","author":[{"given":"Mahdi","family":"Taheri","sequence":"first","affiliation":[]},{"given":"Khashayar","family":"Khorasani","sequence":"additional","affiliation":[]},{"given":"Iman","family":"Shames","sequence":"additional","affiliation":[]},{"given":"Nader","family":"Meskin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2016.7810511"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2337974"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2019.8796266"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524932"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2019.8820512"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.3342"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2016.7604888"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919789"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.3798"},{"key":"ref19","first-page":"6","article-title":"Leader-based multi-agent coordination: Controllability and optimal control","author":"ji","year":"2006","journal-title":"2006 American Control Conference"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3182\/20140824-6-ZA-1003.00226"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2011.09.011"},{"journal-title":"Modern Control Theory","year":"1991","author":"brogan","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.12.027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2012.0221"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0044459"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.06.006"},{"key":"ref8","first-page":"213","article-title":"Consensus of multiagent systems and synchronization of complex networks: A unified viewpoint","volume":"57","author":"li","year":"2009","journal-title":"IEEE Transactions on Circuits and Systems I Regular Papers"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2017.04.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2009675"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834113"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2012.690162"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2275666"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/060674909"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_324"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511840371"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6859421"},{"key":"ref25","first-page":"158","article-title":"Kqml based communication protocol for multi agent systems","volume":"12","author":"juneja","year":"2015","journal-title":"International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)"}],"event":{"name":"2020 IEEE Conference on Control Technology and Applications (CCTA)","start":{"date-parts":[[2020,8,24]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,8,26]]}},"container-title":["2020 IEEE Conference on Control Technology and Applications (CCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200884\/9206152\/09206392.pdf?arnumber=9206392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:48:52Z","timestamp":1656344932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9206392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ccta41146.2020.9206392","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}