{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:38Z","timestamp":1725751658220},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/ecc.2015.7331099","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:45:17Z","timestamp":1448318717000},"page":"3659-3664","source":"Crossref","is-referenced-by-count":10,"title":["Finite energy and bounded actuator attacks on cyber-physical systems"],"prefix":"10.1109","author":[{"given":"Seddik M.","family":"Djouadi","sequence":"first","affiliation":[]},{"given":"Alexander M.","family":"Melin","sequence":"additional","affiliation":[]},{"given":"Erik M.","family":"Ferragut","sequence":"additional","affiliation":[]},{"given":"Jason A.","family":"Laska","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Anis","family":"Drira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"M F P Services and M Labs","article-title":"Global energy attacks: Night","year":"2011","key":"ref10"},{"year":"2012","key":"ref11","article-title":"Kaspersky lab and itu research reveals new advanced cyber threat"},{"key":"ref12","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security"},{"key":"ref13","article-title":"Attack detection and identification in cyber-physical systems part i: Models and fundamental limitations","author":"pasqualetti","year":"2012","journal-title":"arXiv 1202 6144v2 [math OC]"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-00602-9_3","article-title":"Safe and secure networked control systems under denial-of-service attacks","author":"amin","year":"2009","journal-title":"Hybrid Systems Computation and Control"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717318"},{"key":"ref17","article-title":"Secure control against replay attacks","author":"mo","year":"2010","journal-title":"Conference on Communications Control and Computing"},{"key":"ref18","article-title":"Stackelberg-game analysis of correlated attacks in cyber-physical systems","author":"zhu","year":"2011","journal-title":"American Control Conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6161031"},{"key":"ref4","article-title":"Teen derails tram after hacking train network","author":"leyden","year":"2008","journal-title":"The Register"},{"key":"ref3","article-title":"Cracks in the system","author":"quinn-judge","year":"2002","journal-title":"TIME Magazine"},{"key":"ref6","article-title":"Experts hack power grid in no time","author":"greene","year":"2008","journal-title":"Network"},{"key":"ref5","article-title":"Hackers cut cities' power","author":"greenberg","year":"2008","journal-title":"Forbes"},{"key":"ref8","article-title":"Tva needs to address weaknesses in control systems and networks","author":"security","year":"2008","journal-title":"Tech Rep GAO-08&#x2013;526 Report to Congressional Requesters Tech Rep"},{"key":"ref7","article-title":"Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses","author":"halperin","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"article-title":"W32.stuxnet.dossier","year":"2011","author":"falliere","key":"ref9"},{"key":"ref1","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"2008","journal-title":"3rd USENIX workshop on Hot Topics in Security (HotSec &#x2018;08) Associated with the 17th USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5685223"},{"journal-title":"Robust and Optimal Control","year":"1995","author":"zhou","key":"ref22"},{"key":"ref21","article-title":"Key establishment via common state information in networked","author":"li","year":"2011","journal-title":"Proceedings of the American Control Conference"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2014.6859001"},{"journal-title":"Linear Robust Control","year":"1995","author":"green","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.925826"}],"event":{"name":"2015 European Control Conference (ECC)","start":{"date-parts":[[2015,7,15]]},"location":"Linz, Austria","end":{"date-parts":[[2015,7,17]]}},"container-title":["2015 European Control Conference (ECC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7317886\/7330515\/07331099.pdf?arnumber=7331099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:14:19Z","timestamp":1498263259000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7331099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ecc.2015.7331099","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}