{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:29:33Z","timestamp":1762176573493},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cdc.2011.6161527","type":"proceedings-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T16:18:31Z","timestamp":1331137111000},"page":"4078-4083","source":"Crossref","is-referenced-by-count":11,"title":["On the interdependence of reliability and security in Networked Control Systems"],"prefix":"10.1109","author":[{"given":"Saurabh","family":"Amin","sequence":"first","affiliation":[]},{"given":"Galina A.","family":"Schwartz","sequence":"additional","affiliation":[]},{"given":"S. Shankar","family":"Sastry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09762-6_3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0041"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887306"},{"key":"1","article-title":"Interdependent security: A general model","author":"heal","year":"2004","journal-title":"National Bureau of Economic Research"},{"key":"7","article-title":"Security of interdependent and identical networked control systems","author":"amin","year":"2010","journal-title":"Ser TRUST Working Papers"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375463"},{"journal-title":"Network Security A Decision and Game Theoretic Approach","year":"2011","author":"alpcan","key":"5"},{"key":"4","article-title":"Modeling cyber-insurance: Towards a unifying framework","author":"bo?hme","year":"2010","journal-title":"Proceedings of the Workshop on the Economics of Information Security WEIS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024119208153"},{"key":"8","article-title":"Interdependence of reliability and security","author":"honeyman","year":"2007","journal-title":"Proceedings of the 6th Workshop on Economics of Information Security (WEIS)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_1"}],"event":{"name":"2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011)","start":{"date-parts":[[2011,12,12]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2011,12,15]]}},"container-title":["IEEE Conference on Decision and Control and European Control Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6149620\/6159299\/06161527.pdf?arnumber=6161527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:56:49Z","timestamp":1490104609000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6161527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cdc.2011.6161527","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}