{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:32:43Z","timestamp":1730208763920,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/coase.2017.8256231","type":"proceedings-article","created":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T18:11:01Z","timestamp":1516212661000},"page":"988-993","source":"Crossref","is-referenced-by-count":8,"title":["Modeling and simulation of cyberattacks for resilient cyber-physical systems"],"prefix":"10.1109","author":[{"given":"Nafiul","family":"Rashid","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Gustavo","family":"Quiros","sequence":"additional","affiliation":[]},{"given":"Arquimedes","family":"Canedo","sequence":"additional","affiliation":[]},{"given":"Mohammad Abdullah","family":"Al Faruque","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Challenges for Securing Cyber Physical Systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Svstems Security DHS 23"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"journal-title":"Secure Estimation and Control for Cyber-physical Systems under Adversarial Attacks","year":"2012","author":"fawzi","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461457"},{"key":"ref14","first-page":"195","article-title":"Cyber-physical security of a smart grid infrastructure","author":"mo","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref15","article-title":"Acoustic side-channel attacks on additive manufacturing systems","author":"al","year":"2016","journal-title":"Proceedings of the 7th International Conference on Cyber-Physical Systems"},{"journal-title":"Alexandria VA USA","article-title":"Institute for Defense Analyses","year":"2012","key":"ref16"},{"key":"ref17","article-title":"Functional model-based design methodology for automotive cyber-nhvsical systems","author":"wan","year":"0","journal-title":"IEEE Systems Journal (2015)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176494"},{"key":"ref19","first-page":"39","article-title":"2014. Functional modeling compiler for system-level design of automotive cyber-physical systems","author":"canedo","year":"0","journal-title":"Proceedings of the 2014 IEEE\/ACM International Conference on Computer-Aided Design (ICCAD &#x2018;14)"},{"key":"ref4","first-page":"bsi","article-title":"Bundesamt fuer Sicherheit in der Informationstechnik","year":"2014","journal-title":"Bonn"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref6","article-title":"Defending a New Domain: The Pentagon's Cyber-stratezv","volume":"89","author":"lynn","year":"2010","journal-title":"Foreion Affairs"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CODESISSS.2015.7331365"},{"journal-title":"The US Military Can't Train To Fend Off the Worst Cyber Attacks on Infrastructure - Yet DefenseOne","year":"2016","author":"tucker","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref1","article-title":"W32. Stuxnet dossier","volume":"5","author":"falliere","year":"2011","journal-title":"White Paper Symantec Corp Security Response"},{"journal-title":"Cyber Physical Systems Security (CPSSEC)","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301644"},{"year":"0","key":"ref22"},{"key":"ref21","first-page":"102","article-title":"Risk based Multi-Agent Chilled Water Control System for a More Survivable Naval Ship","volume":"4","author":"yan","year":"2012","journal-title":"International Journal of Intelligent Control and Systems"}],"event":{"name":"2017 13th IEEE Conference on Automation Science and Engineering (CASE 2017)","start":{"date-parts":[[2017,8,20]]},"location":"Xi'an, China","end":{"date-parts":[[2017,8,23]]}},"container-title":["2017 13th IEEE Conference on Automation Science and Engineering (CASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8244402\/8256062\/08256231.pdf?arnumber=8256231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T18:06:26Z","timestamp":1643306786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8256231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/coase.2017.8256231","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}