{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:15:46Z","timestamp":1770336946554,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/comsnets.2017.7945354","type":"proceedings-article","created":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T16:44:12Z","timestamp":1497285852000},"page":"23-30","source":"Crossref","is-referenced-by-count":20,"title":["On minimal tests of sensor veracity for dynamic watermarking-based defense of cyber-physical systems"],"prefix":"10.1109","author":[{"given":"Bharadwaj","family":"Satchidanandan","sequence":"first","affiliation":[]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and Secure Networked Control Systems under Denial-of-Service Attacks","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913673","author":"abur","year":"2004","journal-title":"Power System State Estimation Theory and Implementation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2280658"},{"key":"ref13","article-title":"On security indices for state estimators in power networks","author":"sandberg","year":"2010","journal-title":"First Workshop on Secure Control Systems (SCS)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351625"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7554505"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2570003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120187"},{"key":"ref28","article-title":"SIAM Classics in Applied Mathematics","author":"kumar","year":"2015","journal-title":"Stochastic Systems Estimation Identification and Adaptive Control"},{"key":"ref4","article-title":"Challenges for Securing Cyber Physical Systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1970.7723"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1300000037","article-title":"A Clean Slate Approach to Secure Wireless Networking","volume":"9","author":"ponniah","year":"2014","journal-title":"Foundations and Trends in Networking"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176345697"},{"key":"ref5","author":"abrams","year":"2008","journal-title":"Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services Australia"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061954"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref9","author":"cardenas","year":"0","journal-title":"Research Challenges for the Security of Control Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766503"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039974"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798283"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"}],"event":{"name":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","location":"Bengaluru, India","start":{"date-parts":[[2017,1,4]]},"end":{"date-parts":[[2017,1,8]]}},"container-title":["2017 9th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7938017\/7945334\/07945354.pdf?arnumber=7945354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T19:32:42Z","timestamp":1569439962000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7945354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2017.7945354","relation":{},"subject":[],"published":{"date-parts":[[2017,1]]}}}