{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:03:28Z","timestamp":1770833008135,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/iccps.2014.6843720","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T21:09:21Z","timestamp":1406581761000},"page":"163-174","source":"Crossref","is-referenced-by-count":169,"title":["Robustness of attack-resilient state estimators"],"prefix":"10.1109","author":[{"given":"Miroslav","family":"Pajic","sequence":"first","affiliation":[]},{"given":"James","family":"Weimer","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Bezzo","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Tabuada","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]},{"given":"George J.","family":"Pappas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"90","article-title":"A decoupled feedback structure for covertly appropriating networked control systems","author":"smith","year":"2011","journal-title":"Proc IFAC World Congress"},{"key":"22","first-page":"19","article-title":"A simple demonstration that the global positioning system (gps) is vulnerable to spoofing","volume":"25","author":"warner","year":"2002","journal-title":"Journal of Security Administration"},{"key":"17","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-642-40349-1_4","article-title":"Non-invasive spoofing attacks for anti-lock braking systems","author":"shoukry","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2013"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/37.898794"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"16","article-title":"ROS: An open-source robot operating system","volume":"3","author":"quigley","year":"2009","journal-title":"Proceedings of the Open-Source Software Workshop at the International Conference on Robotics and Automation (ICRA)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2461446.2461457"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2226594"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470877999"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"3","author":"antsaklis","year":"1997","journal-title":"Linear Systems"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717166"},{"key":"2","article-title":"Use fake GPS signals to knock a yacht off course","year":"2013","journal-title":"MIT Technology Review"},{"key":"1","year":"0","journal-title":"Black-I Robotics Land Shark UGV"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"2011","journal-title":"Proceedings of USENIX Security Symposium"},{"key":"5","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"2008","journal-title":"Proc 3rd USENIX Workshop on Hot Topics in Security"},{"key":"4","author":"bertsimas","year":"1997","journal-title":"Introduction to Linear Optimization"},{"key":"9","author":"fawzi","year":"2012","journal-title":"Secure Estimation and Control for Cyber-physical Systems under Adversarial Attacks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120187"}],"event":{"name":"2014 ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS)","location":"Berlin, Germany","start":{"date-parts":[[2014,4,14]]},"end":{"date-parts":[[2014,4,17]]}},"container-title":["2014 ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6834857\/6843703\/06843720.pdf?arnumber=6843720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:26:29Z","timestamp":1602689189000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6843720"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccps.2014.6843720","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}