{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:06:42Z","timestamp":1758269202388,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cdc.2011.6161327","type":"proceedings-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T21:18:31Z","timestamp":1331155111000},"page":"6624-6629","source":"Crossref","is-referenced-by-count":24,"title":["Attack-resilient distributed formation control via online adaptation"],"prefix":"10.1109","author":[{"given":"Minghui","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Martinez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A trust based distributed Kalman filtering approach for mode estimation in power systems","author":"jiang","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080928"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2009.2033770"},{"key":"36","doi-asserted-by":"crossref","first-page":"3632","DOI":"10.1109\/CDC.2002.1184926","article-title":"Global stability with time-delay in network congestion control","author":"wang","year":"2002","journal-title":"Proceedings of the 41st IEEE Conference on Decision and Control"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2003.812781"},{"journal-title":"Reinforcement Learning An Introduction","year":"1998","author":"sutton","key":"33"},{"journal-title":"Game Theory","year":"1991","author":"fudenberg","key":"15"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717544"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.09.019"},{"key":"14","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1016\/j.automatica.2005.12.008","article-title":"Distributed receding horizon control for multi-vehicle formation stabilization","volume":"42","author":"dunbar","year":"2006","journal-title":"Automatica"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622048"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/9.867021"},{"key":"38","article-title":"Stackelberg game analysis of correlated attacks in cyber-physical systems","author":"zhu","year":"2011","journal-title":"2011 American Control Conference"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/060657029"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.849258"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834105"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887294"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.835360"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834113"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2158130"},{"key":"28","article-title":"Distributed estimation and false data detection with application to power networks","author":"pasqualetti","year":"0","journal-title":"Automatica"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84800-015-5","author":"ren","year":"2008","journal-title":"Distributed Consensus in Multi-Vehicle Cooperative Control"},{"key":"3","first-page":"161","article-title":"Stealthy deception attacks on water SCADA systems","author":"amin","year":"2010","journal-title":"Proceedings of the 13th ACM International Conference on Hybrid Systems Computation and Control"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2000.878601"},{"journal-title":"Network Security A Decision and Game Theoretic Approach","year":"2011","author":"alpcan","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.35"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2010.5530755"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5991188"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2088690"},{"journal-title":"Adaptive Control","year":"2008","author":"a?stro?m","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"4","article-title":"Security of interdependent and identical networked control systems","author":"amin","year":"2010","journal-title":"Automatica"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717917"}],"event":{"name":"2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)","start":{"date-parts":[[2011,12,12]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2011,12,15]]}},"container-title":["IEEE Conference on Decision and Control and European Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6149620\/6159299\/06161327.pdf?arnumber=6161327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:19:34Z","timestamp":1497971974000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6161327\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/cdc.2011.6161327","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}