{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:48:31Z","timestamp":1764841711109},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cdc.2012.6426257","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T22:05:08Z","timestamp":1360361108000},"page":"3418-3425","source":"Crossref","is-referenced-by-count":55,"title":["Cyber-physical security via geometric control: Distributed monitoring and malicious attacks"],"prefix":"10.1109","author":[{"given":"Fabio","family":"Pasqualetti","sequence":"first","affiliation":[]},{"given":"Florian","family":"Dorfler","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Bullo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2158130"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2088690"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/59.131054"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160297"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.1996.558870"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"11","first-page":"911","article-title":"Secure control against replay attacks","author":"mo","year":"2010","journal-title":"Allerton Conf on Communications Control and Computing"},{"key":"12","first-page":"90","article-title":"A decoupled feedback structure for covertly appropriating network control systems","author":"smith","year":"2011","journal-title":"IFAC World Congress"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2009.2035515"},{"key":"20","first-page":"161","article-title":"Stealthy deception attacks on water SCADA systems","author":"amin","year":"2010","journal-title":"Hybrid Systems Computation and Control"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1082-5"},{"journal-title":"Controlled and Conditioned Invariants in Linear System Theory","year":"1991","author":"basile","key":"23"},{"key":"24","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551379"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5991344"},{"key":"27","first-page":"1486","article-title":"Distributed detection of cyberphysical attacks in power networks: A waveform relaxation approach","author":"do?rfler","year":"2011","journal-title":"Allerton Conf on Communications Control and Computing"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/0024-3795(93)90424-M"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.1982.1270004"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/et.2010.0410"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"1","article-title":"Attack detection and identification in cyber-physical systems","author":"pasqualetti","year":"2012","journal-title":"IEEE Transactions on Automatic Control"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2010.11.031"},{"journal-title":"Detection of Abrupt Changes Theory and Application","year":"1993","author":"basseville","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1049\/et:20080602"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(90)90138-8"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"31","article-title":"Continuous-time distributed estimation with discrete communication","author":"do?rfler","year":"2012","journal-title":"Journal of Selected Topics in Signal Processing"},{"journal-title":"SQL Slammer Worm Lessons Learned for Consideration by the Electricity Sector","year":"2003","author":"kuvshinkova","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"}],"event":{"name":"2012 IEEE 51st Annual Conference on Decision and Control (CDC)","start":{"date-parts":[[2012,12,10]]},"location":"Maui, HI, USA","end":{"date-parts":[[2012,12,13]]}},"container-title":["2012 IEEE 51st IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6416474\/6425800\/06426257.pdf?arnumber=6426257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:37:12Z","timestamp":1490143032000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6426257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cdc.2012.6426257","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}