{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:47:19Z","timestamp":1761648439228,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icit.2017.7915444","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T22:23:01Z","timestamp":1494627781000},"page":"698-703","source":"Crossref","is-referenced-by-count":5,"title":["A cyber-attack on communication link in distributed systems and detection scheme based on H-infinity filtering"],"prefix":"10.1109","author":[{"given":"Fatemeh","family":"Ahmadloo","sequence":"first","affiliation":[]},{"given":"Farzad Rajaei","family":"Salmasi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Attack Detection and Identification in Cyber-Physical Systems&#x2014;Part I Models and Fundamental Limitations","year":"2012","author":"pasqualetti","key":"ref10"},{"key":"ref11","volume":"104","author":"zhou","year":"1998","journal-title":"Essentials of Robust Control"},{"journal-title":"MATPOWER User's Manual","year":"0","author":"zimmerman","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2011.5991344"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/et.2010.0410"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-014-0212-3"},{"key":"ref1","article-title":"Detection and isolation of actuator and sensor faults for networked control systems","author":"ahmadi","year":"2016","journal-title":"Optimal Control Applications and Methods"},{"journal-title":"Attack Detection and Identification in Cyber-Physical Systems&#x2014;Part II Centralized and Distributed Monitor Design","year":"2012","author":"pasqualetti","key":"ref9"}],"event":{"name":"2017 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2017,3,22]]},"location":"Toronto, ON","end":{"date-parts":[[2017,3,25]]}},"container-title":["2017 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7907563\/7912587\/07915444.pdf?arnumber=7915444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T17:22:37Z","timestamp":1499707357000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7915444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icit.2017.7915444","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}