{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:57:07Z","timestamp":1776333427503,"version":"3.51.2"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cdc.2014.7039487","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:53:59Z","timestamp":1424202839000},"page":"848-853","source":"Crossref","is-referenced-by-count":79,"title":["Anomaly detection in cyber-physical systems: A formal methods approach"],"prefix":"10.1109","author":[{"given":"Austin","family":"Jones","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhaodan","family":"Kong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Calin","family":"Belta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_58"},{"key":"ref11","first-page":"71","article-title":"Monitoring temporal properties of continuous signals","author":"maler","year":"2004","journal-title":"Formal Techniques Modelling and Analysis of Timed and Fault-Tolerant Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29860-8_12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2005.01.009"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2249","DOI":"10.1109\/CDC.1999.831255","article-title":"On the existence of executions of hybrid automata","volume":"3","author":"lygeros","year":"1999","journal-title":"Decision and Control 1999 Proceedings of the 38th IEEE Conference on"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2562059.2562146"},{"key":"ref5","first-page":"1164","article-title":"Maritime anomaly detection using Gaussian Process active learning","author":"kowalska","year":"2012","journal-title":"2012 15th International Conference on Information Fusion FUSION"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.06.021"},{"key":"ref7","article-title":"Mining requirements from closed-loop control models","author":"jin","year":"2013","journal-title":"Hybrid Systems Computation and Control (HSCC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-642-15297-9_9","article-title":"Robust satisfaction of temporal logic over real-valued signals","author":"donze","year":"2010","journal-title":"Formal Modeling and Analysis of Timed Systems"}],"event":{"name":"2014 IEEE 53rd Annual Conference on Decision and Control (CDC)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2014,12,15]]},"end":{"date-parts":[[2014,12,17]]}},"container-title":["53rd IEEE Conference on Decision and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027307\/7039338\/07039487.pdf?arnumber=7039487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:44:31Z","timestamp":1498196671000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7039487\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cdc.2014.7039487","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}