{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:53:59Z","timestamp":1730220839789,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/etfa.2018.8502554","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T03:20:08Z","timestamp":1542338408000},"page":"1023-1030","source":"Crossref","is-referenced-by-count":1,"title":["Vulnerability Analysis of Cyber Physical Systems Under False-Data Injection and Disturbance Attacks"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Gerard","sequence":"first","affiliation":[]},{"given":"Souad Bezzaoucha","family":"Rebai","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Voos","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Darouach","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5718158"},{"key":"ref11","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"First Workshop on Secure Control Systems Cyber Physical Systems Week"},{"key":"ref12","first-page":"93","article-title":"Physical authentication of control systems designing watermarked control inputs to detect counterfeit sensor outputs","author":"mo","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCS.2016.2643239","article-title":"Design and implementation of attack-resilient cyberphysical systems","volume":"37","author":"pajic","year":"2017","journal-title":"IEEE Control Systems Magazine"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2011.2160543"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6426257"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0898-1221(98)00242-9"},{"journal-title":"Generalized Inverse of Matrices and its Applications","year":"1971","author":"rao","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2014.6862206"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"journal-title":"Controlled and Conditioned Invariants in Linear System Theory","year":"1992","author":"basile","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2046075"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2018.8431204"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040293"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MED.2015.7158856"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.08.031"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1980.1102520"},{"journal-title":"Adventures in Automotive Networks and Control Units","year":"2014","author":"miller","key":"ref9"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCS.2014.2364723","article-title":"Covert misappropriation of networked control systems","volume":"35","author":"smith","year":"2015","journal-title":"IEEE Control Systems"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"year":"0","author":"team","key":"ref21"}],"event":{"name":"2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2018,9,4]]},"location":"Turin","end":{"date-parts":[[2018,9,7]]}},"container-title":["2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488382\/8502441\/08502554.pdf?arnumber=8502554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:00:53Z","timestamp":1598223653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8502554\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/etfa.2018.8502554","relation":{},"subject":[],"published":{"date-parts":[[2018,9]]}}}