{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T14:38:46Z","timestamp":1762007926365,"version":"build-2065373602"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/iisr.2018.8535978","type":"proceedings-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T02:18:10Z","timestamp":1542334690000},"page":"7-12","source":"Crossref","is-referenced-by-count":12,"title":["Detection and Mitigation of False Data Injection Attacks for Secure Interactive Networked Control Systems"],"prefix":"10.1109","author":[{"given":"Ryogo","family":"Kubo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"1630","DOI":"10.1109\/TSG.2015.2495133","article-title":"A review of false data injection attacks against modern power systems","volume":"8","author":"liang","year":"2017","journal-title":"IEEE Trans Smart Grid"},{"key":"ref11","first-page":"613","article-title":"Se-cure networked motion control using tampering detection observer","author":"hoshino","year":"2016","journal-title":"Proc 31st Int Technical Conf Circuits\/Systems Computers and Communications (ITC-CSCC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/70.258054"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/rob.10030"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2010.936761"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.02.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2422992"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524934"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/41.222648"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/3516.491410"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2178216"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E100.A.2086"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2425142"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2013.6580348"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2011.2160543"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2035462"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2676005"}],"event":{"name":"2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)","start":{"date-parts":[[2018,8,24]]},"location":"Shenyang","end":{"date-parts":[[2018,8,27]]}},"container-title":["2018 IEEE International Conference on Intelligence and Safety for Robotics (ISR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8517202\/8535604\/08535978.pdf?arnumber=8535978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:10:42Z","timestamp":1643224242000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8535978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iisr.2018.8535978","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}