{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:32:16Z","timestamp":1771698736047,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/cdc.2013.6760746","type":"proceedings-article","created":{"date-parts":[[2014,3,13]],"date-time":"2014-03-13T22:14:07Z","timestamp":1394748847000},"page":"5444-5449","source":"Crossref","is-referenced-by-count":55,"title":["Optimal DoS attack policy against remote state estimation"],"prefix":"10.1109","author":[{"family":"Heng Zhang","sequence":"first","affiliation":[]},{"family":"Peng Cheng","sequence":"additional","affiliation":[]},{"family":"Ling Shi","sequence":"additional","affiliation":[]},{"family":"Jiming Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Optimal periodic sensor schedule for steady-state estimation under average transmission energy constraint","author":"ren","year":"0","journal-title":"IEEE Transactions on Automatic Control"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.5120\/5824-8064"},{"key":"17","first-page":"1","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"2008","journal-title":"Proceedings of the 3rd Conference on Hot Topics in Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2184536"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/BF00941822"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00940281"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2210058"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2011.02.037"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2216537"},{"key":"1","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2076569.2076581"},{"key":"7","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","article-title":"Denial-of-service attack detection techniques","volume":"10","author":"carl","year":"2006","journal-title":"IEEE Internet Computing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2008.02.001"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837464"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"8","first-page":"64","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"strasser","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"2013 IEEE 52nd Annual Conference on Decision and Control (CDC)","location":"Firenze","start":{"date-parts":[[2013,12,10]]},"end":{"date-parts":[[2013,12,13]]}},"container-title":["52nd IEEE Conference on Decision and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6749719\/6759837\/06760746.pdf?arnumber=6760746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:35:11Z","timestamp":1498124111000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6760746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cdc.2013.6760746","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}