{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:23:05Z","timestamp":1730204585717,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/cdc.2018.8619407","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T00:12:50Z","timestamp":1548288770000},"page":"2068-2073","source":"Crossref","is-referenced-by-count":5,"title":["On the Operational Significance of the Securable Subspace for Partially Observed Linear Stochastic Systems"],"prefix":"10.1109","author":[{"given":"Bharadwaj","family":"Satchidanandan","sequence":"first","affiliation":[]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"6:1","article-title":"Research Challenges for the Security of Control Systems","author":"c\u00e1rdenas","year":"2008","journal-title":"Proc of the 3rd Conference on Hot Topics in Security HOTSEC'08"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and Secure Networked Control Systems under Denial-of-Service Attacks","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160641"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/T-PAS.1975.31858"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref17","first-page":"283","article-title":"Secure control of networked cyber-physical systems","year":"2016","journal-title":"2016 IEEE 55th Conference on Decision and Control (CDC) CDC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2017.7945354"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCS.2014.2364725","article-title":"Control-theoretic methods for cyberphysical security: Geometric principles for optimal cross-layer resilient control systems","volume":"35","author":"pasqualetti","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176345697"},{"journal-title":"Remote exploitation of an unaltered passenger vehicle","year":"2015","author":"miller","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039631"},{"key":"ref3","article-title":"The vulnerability of nuclear facilities to cyber attack; strategic insights: Spring 2010","author":"kesler","year":"2011","journal-title":"Strategic Insights Spring 2011"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-319-67068-3_16","article-title":"Control systems under attack: The securable and unsecurable subspaces of a linear stochastic system","author":"satchidanandan","year":"2018","journal-title":"Emerging Applications of Control and System Theory"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1959.1104873"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262835"},{"journal-title":"Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services Australia","year":"2008","author":"abrams","key":"ref2"},{"key":"ref9","article-title":"Challenges for Securing Cyber Physical Systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426257"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120187"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282993"},{"key":"ref25","first-page":"3412","article-title":"Security for control systems under sensor and actuator attacks","year":"2012","journal-title":"Decision and Control (CDC) 2012 IEEE 51st Annual Conference on"}],"event":{"name":"2018 IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2018,12,17]]},"location":"Miami Beach, FL","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8592870\/8618647\/08619407.pdf?arnumber=8619407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:34:51Z","timestamp":1598222091000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8619407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cdc.2018.8619407","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}