{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:07:47Z","timestamp":1761646067604},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/cdc.2017.8263842","type":"proceedings-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T20:30:57Z","timestamp":1516739457000},"page":"1350-1355","source":"Crossref","is-referenced-by-count":17,"title":["Enhancement of security against zero dynamics attack via generalized hold"],"prefix":"10.1109","author":[{"given":"Juhoon","family":"Back","sequence":"first","affiliation":[]},{"given":"Jihan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chanhwa","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Gyunghoon","family":"Park","sequence":"additional","affiliation":[]},{"given":"Hyungbo","family":"Shim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"5956","article-title":"Zero-stealty attack for sampled-data control systems: the case of faster actuation than sensing","author":"kim","year":"2016","journal-title":"Proc of IEEE Conference on Decision and Control"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CDC.2016.7799047"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-5562-1","author":"yuz","year":"2014","journal-title":"Sampled-data models for linear and nonlinear systems"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-615-5","author":"isidori","year":"1995","journal-title":"Nonlinear Control Systems"},{"year":"2002","author":"khalil","journal-title":"Nonlinear Systems","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ACC.2016.7524932"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CDC.2015.7402409"},{"year":"1999","author":"chen","journal-title":"Linear System Theory and Design","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TCST.2009.2026285"},{"key":"ref3","article-title":"Analysis of the cyber attack on the ukrainian power grid","author":"langner","year":"2016","journal-title":"Joint work between SANS ICS and the Electricity Information Sharing and Analysis Center"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CDC.2013.6760746"},{"year":"2008","author":"ding","journal-title":"Model-Based Fault Diagnosis Techniques Design Schemes Algorithms and Tools","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/Allerton.2012.6483441"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ALLERTON.2009.5394956"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1049\/et.2010.0410"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MSP.2011.67"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.automatica.2014.10.067"}],"event":{"name":"2017 IEEE 56th Annual Conference on Decision and Control (CDC)","start":{"date-parts":[[2017,12,12]]},"location":"Melbourne, Australia","end":{"date-parts":[[2017,12,15]]}},"container-title":["2017 IEEE 56th Annual Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253407\/8263624\/08263842.pdf?arnumber=8263842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T18:30:27Z","timestamp":1570645827000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8263842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cdc.2017.8263842","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}