{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:21:14Z","timestamp":1740720074454,"version":"3.38.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,16]]},"DOI":"10.1109\/cdc56724.2024.10886707","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:32Z","timestamp":1740595412000},"page":"2373-2378","source":"Crossref","is-referenced-by-count":0,"title":["Unknown Input Observers Breaking Confidentiality of Controller States"],"prefix":"10.1109","author":[{"given":"Enno","family":"Breukelman","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology,School of Electrical Engineering and Computer Science, Division of Decision and Control Systems,Malvinas v&#x00E4;g 10,Stockholm,Sweden,SE-100 44"}]},{"given":"Henrik","family":"Sandberg","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,School of Electrical Engineering and Computer Science, Division of Decision and Control Systems,Malvinas v&#x00E4;g 10,Stockholm,Sweden,SE-100 44"}]}],"member":"263","reference":[{"article-title":"The real story of stuxnet","author":"Kushner","key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/MSPEC.2013.6471059"},{"article-title":"As Baltics see spike in GPS jamming, NATO must respond","year":"2024","author":"Goward","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-control-072921-075953"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2019.04.011"},{"article-title":"Computer security: art and science","volume-title":"Addison-Wesley","author":"Bishop","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2891891"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.109329"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/mcs.2014.2364723"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSMC.2020.3049092"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2950072"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.01.009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.09.003"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2020.3029160"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2020.108920"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2022.105178"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2016.7849882"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.10.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798915"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1984.1103465"},{"article-title":"Optimal filtering. in Prentice-Hall information and system sciences series","volume-title":"Pren-tice-Hall","author":"Anderson","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1986.1104415"},{"volume-title":"Multivariable feedback control: analysis and design","year":"2005","author":"Skogestad","key":"ref23"},{"journal-title":"Lecture Notes","article-title":"Fault-Tolerant and Secure Control Systems","author":"Sundaram","key":"ref24"},{"volume-title":"Kalman Filtering Techniques for System Inversion and Data Assimilation","year":"2007","author":"Gillijns","key":"ref25"}],"event":{"name":"2024 IEEE 63rd Conference on Decision and Control (CDC)","start":{"date-parts":[[2024,12,16]]},"location":"Milan, Italy","end":{"date-parts":[[2024,12,19]]}},"container-title":["2024 IEEE 63rd Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885784\/10885785\/10886707.pdf?arnumber=10886707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T09:03:49Z","timestamp":1740647029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10886707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cdc56724.2024.10886707","relation":{},"subject":[],"published":{"date-parts":[[2024,12,16]]}}}