{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T04:45:47Z","timestamp":1745901947401,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/cdc.2018.8619250","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:12:50Z","timestamp":1548288770000},"page":"2074-2079","source":"Crossref","is-referenced-by-count":4,"title":["Secure State Estimation with Cumulative Message Authentication"],"prefix":"10.1109","author":[{"given":"Ilija","family":"Jovanov","sequence":"first","affiliation":[]},{"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref11","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"Workshop on Secure Control Systems CPS Week"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2498708"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"Control Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.259"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2016.2643239"},{"journal-title":"Vehicle Dynamics and Control","year":"2011","author":"rajamani","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963810"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2761762"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263660"},{"key":"ref6","first-page":"1","article-title":"Real-time safety assessment of unmanned aircraft systems against stealthy cyber attacks","author":"kwon","year":"2015","journal-title":"Journal of Aerospace Information Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3126518"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2017.00012"},{"key":"ref2","article-title":"Relaxing integrity requirements for resilient control systems","volume":"abs 1707 2950","author":"jovanov","year":"2017","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2573039"}],"event":{"name":"2018 IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2018,12,17]]},"location":"Miami Beach, FL","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8592870\/8618647\/08619250.pdf?arnumber=8619250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:37:54Z","timestamp":1598225874000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8619250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cdc.2018.8619250","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}