{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T09:55:24Z","timestamp":1769766924934,"version":"3.49.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icnc57223.2023.10074353","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T17:39:46Z","timestamp":1679593186000},"page":"35-41","source":"Crossref","is-referenced-by-count":7,"title":["On False Data Injection Attack against Building Automation Systems"],"prefix":"10.1109","author":[{"given":"Michael","family":"Cash","sequence":"first","affiliation":[{"name":"University of Central Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christopher","family":"Morales-Gonzalez","sequence":"additional","affiliation":[{"name":"Southeast University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shan","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xipeng","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Central Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alex","family":"Parlato","sequence":"additional","affiliation":[{"name":"University of Central Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jason","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Central Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qun Zhou","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Central Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Central Florida"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Global knx products market insights and forecast to 2027","year":"2021"},{"key":"ref2","volume-title":"Identifying and defeating blended cyber-physical security threats","author":"Wyss","year":"2007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ics-csr2014.7"},{"key":"ref4","article-title":"Learn how to control every room at a luxury hotel remotely: The dangers of insecure home automation deployment","author":"Molina","year":"2014","journal-title":"BlackHat USA"},{"key":"ref5","volume-title":"Exploiting access control and facility management systems","author":"Rios","year":"2014"},{"key":"ref6","article-title":"Sneak into buildings with KNXnet\/IP","volume-title":"Sneak into buildings with KNXnet\/IP","author":"Vacherot"},{"key":"ref7","volume-title":"Surface Production Operations: Volume IV: Pumps and Compressors","author":"Stewart","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3156867"},{"key":"ref9","first-page":"733","article-title":"Tools and techniques to calibrate electric chiller component models\/discussion","volume":"108","author":"Hydeman","year":"2002","journal-title":"ASHRAE transactions"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/19401493.2013.765506"}],"event":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10073968\/10073976\/10074353.pdf?arnumber=10074353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T06:12:44Z","timestamp":1710396764000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10074353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icnc57223.2023.10074353","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}