{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T15:44:51Z","timestamp":1772293491694,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/iccnc.2013.6504104","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T21:30:11Z","timestamp":1367011811000},"page":"327-333","source":"Crossref","is-referenced-by-count":17,"title":["Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming"],"prefix":"10.1109","author":[{"given":"E. S.","family":"Canepa","sequence":"first","affiliation":[]},{"given":"C. G.","family":"Claudel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2008.02.005"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2009.10.006"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378604"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3934\/nhm.2006.1.601"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1137\/0331016"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/0191-2615(94)90002-7"},{"key":"14","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.trb.2004.04.003","article-title":"A variational formulation of kinematic waves: Basic theory and complex boundary conditions","volume":"39 b","author":"daganzo","year":"2005","journal-title":"Transporation Research B"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1137\/090778754"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2307\/1999343"},{"key":"21","first-page":"43","article-title":"Discussion of 'freeway level of service as influenced by volume and capacity characteristics'","volume":"99","author":"moskowitz","year":"1965","journal-title":"Highway Research Record"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2011.07.004"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/0191-2615(93)90038-C"},{"key":"23","author":"smith","year":"2000","journal-title":"Research Directions in Distributed Parameter Systems SIAM"},{"key":"24","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1002\/rnc.1099","article-title":"Weak formulation of boundary conditions for scalar conservation laws","volume":"16","author":"strub","year":"2006","journal-title":"International Journal of Robust and Nonlinear Control"},{"key":"25","first-page":"1","article-title":"A distributed highway velocity model for traffic state reconstruction","volume":"1","author":"work","year":"2010","journal-title":"Applied Mathematics Research eXpress"},{"key":"26","year":"0"},{"key":"27","year":"0"},{"key":"3","author":"aubin","year":"1991","journal-title":"Viability Theory Systems and Control Foundations and Applications"},{"key":"2","first-page":"161","article-title":"Stealthy deception attacks on water scada systems","author":"amin","year":"2010","journal-title":"Proceedings of the 13th ACM International Conference on Hybrid Systems Computation and Control"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2045439"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"7","article-title":"Exact solutions to traffic density estimation problems involving the lighthill-whitman-richards traffic flow model using mixed integer linear programing","author":"canepa","year":"2012","journal-title":"Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1080\/03605309908820745"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4755-1"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1137\/060659569"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2041976"},{"key":"8","author":"christofides","year":"2001","journal-title":"Nonlinear and Robust Control of Partial Differential Equation Systems Methods and Applications to Transport-Reaction Processes"}],"event":{"name":"2013 International Conference on Computing, Networking and Communications (ICNC 2013)","location":"San Diego, CA","start":{"date-parts":[[2013,1,28]]},"end":{"date-parts":[[2013,1,31]]}},"container-title":["2013 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495637\/6504039\/06504104.pdf?arnumber=6504104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:03:45Z","timestamp":1498046625000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6504104\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2013.6504104","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}