{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:54:07Z","timestamp":1730210047514,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1109\/comsnets48256.2020.9027331","type":"proceedings-article","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T06:20:17Z","timestamp":1583821217000},"page":"412-418","source":"Crossref","is-referenced-by-count":2,"title":["The Watermark-Securable Subspace of a Linear System Containing a Single Malicious Actuator"],"prefix":"10.1109","author":[{"given":"Bharadwaj","family":"Satchidanandan","sequence":"first","affiliation":[]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262835"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619407"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120187"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7170734"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7039974"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263914"},{"journal-title":"Simulation and Real-World Evaluation of Attack Detection Schemes Video","year":"2018","author":"porter","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"journal-title":"Malicious Control System Cyber Security Attack Case Study-Maroochy Water Services Australia","year":"2008","author":"abrams","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2016.7798283"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2017.7945354"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JPROC.2012.2189792","article-title":"Cyber-Physical Systems: A Perspective at the Centennial","volume":"100","author":"kim","year":"2012","journal-title":"Proceedings of the IEEE"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-319-67068-3_16","article-title":"Control systems under attack: The securable and unsecurable subspaces of a linear stochastic system","author":"satchidanandan","year":"2018","journal-title":"Emerging Applications of Control and System Theory"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2019.2925278"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1082-5"},{"key":"ref21","first-page":"416","article-title":"Theory and implementation of dynamic watermarking for cybersecurity of advanced transportation systems","author":"ko","year":"2016","journal-title":"2016 IEEE Conference on Communications and Network Security (CNS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176345697"},{"key":"ref23","article-title":"On the watermark-securable subspace of a linear stochastic system","author":"satchidanandan","year":"0","journal-title":"Proceedings of the sixth Indian Control Conference (ICC)"}],"event":{"name":"2020 International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2020,1,7]]},"location":"Bengaluru, India","end":{"date-parts":[[2020,1,11]]}},"container-title":["2020 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9011703\/9027288\/09027331.pdf?arnumber=9027331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T15:35:48Z","timestamp":1656344148000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9027331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/comsnets48256.2020.9027331","relation":{},"subject":[],"published":{"date-parts":[[2020,1]]}}}