{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:19:59Z","timestamp":1760523599471,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/cdc.2017.8263660","type":"proceedings-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T20:30:57Z","timestamp":1516739457000},"page":"163-169","source":"Crossref","is-referenced-by-count":16,"title":["Sporadic data integrity for secure state estimation"],"prefix":"10.1109","author":[{"given":"Ilija","family":"Jovanov","sequence":"first","affiliation":[]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"On the performance degradation of cyber-physical systems under stealthy integrity attacks","volume":"pp","author":"mo","year":"2015","journal-title":"IEEE Transactions on Automatic Control"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref14","article-title":"Computation of the marcum q-function","volume":"abs 1311 681","author":"gil","year":"2013","journal-title":"CoRR"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2039048"},{"key":"ref16","article-title":"Relaxing integrity requirements for resilient control systems","volume":"abs 1707 2950","author":"jovanov","year":"2017","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref3","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Usenix Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717166"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"journal-title":"Inside the cunning unprecedented hack of ukraine's power grid wired magazine","year":"2016","author":"zetter","key":"ref2"},{"key":"ref9","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"}],"event":{"name":"2017 IEEE 56th Annual Conference on Decision and Control (CDC)","start":{"date-parts":[[2017,12,12]]},"location":"Melbourne, Australia","end":{"date-parts":[[2017,12,15]]}},"container-title":["2017 IEEE 56th Annual Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253407\/8263624\/08263660.pdf?arnumber=8263660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T03:17:58Z","timestamp":1518059878000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8263660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cdc.2017.8263660","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}