{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:16:18Z","timestamp":1771262178807,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T00:00:00Z","timestamp":1602201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,9]]},"DOI":"10.1109\/icca51439.2020.9264343","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T21:36:44Z","timestamp":1606772204000},"page":"1189-1192","source":"Crossref","is-referenced-by-count":8,"title":["Predictive feedback control based on DoS attacks network control system"],"prefix":"10.1109","author":[{"given":"Caixia","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Li","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Jianfei","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2007.893073"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.832203"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2009.0441"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/87.998034"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-012-0655-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-012-0680-y"},{"key":"ref16","article-title":"Research challenges for the security of control systems","author":"c'ardenas","year":"2008","journal-title":"HOTSEC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref18","article-title":"DOS attack and prevention","author":"liang-gen","year":"2004","journal-title":"Application Research of Computers"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/00207170150202689"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/37.898794"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/TIE.2003.814761","article-title":"Remote fuzzy logic control of networked control system via profibus-dp","volume":"50","author":"lee","year":"2003","journal-title":"IEEE Trans Ind Electron"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/87.998012","article-title":"A scheduling method for network based control systems","volume":"10","author":"park","year":"2002","journal-title":"IEEE Trans Control Syst Technol"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.870655"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.882015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/41.954551"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/9.763226"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.874261"}],"event":{"name":"2020 IEEE 16th International Conference on Control & Automation (ICCA)","location":"Singapore","start":{"date-parts":[[2020,10,9]]},"end":{"date-parts":[[2020,10,11]]}},"container-title":["2020 IEEE 16th International Conference on Control &amp; Automation (ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9264304\/9264308\/09264343.pdf?arnumber=9264343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:19:10Z","timestamp":1656375550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9264343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icca51439.2020.9264343","relation":{},"subject":[],"published":{"date-parts":[[2020,10,9]]}}}