{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T09:25:18Z","timestamp":1751534718994},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8472036","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"15-22","source":"Crossref","is-referenced-by-count":1,"title":["A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks"],"prefix":"10.1109","author":[{"given":"Clara","family":"Novoa","sequence":"first","affiliation":[]},{"given":"Khan","family":"Siddique","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Tahsini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref11","first-page":"1","article-title":"False Data Injection Attacks in Control Systems","author":"mo","year":"2010","journal-title":"Proceedings of the 1st Workshop on Secure Control Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2017.03.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.35"},{"key":"ref14","article-title":"Dont bury your head in warnings: A game-theoretic approach for intelligent allocation of cybersecurity alerts","author":"schlenker","year":"2017","journal-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI)"},{"journal-title":"A Tutorial on Stochastic Programming","year":"2007","author":"shapiro","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyv007"},{"key":"ref17","article-title":"Cyber security analytics: A stochastic model for security quantification using absorbing Markov Chains","author":"subil","year":"2014","journal-title":"Journal of Communications"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566483"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566484"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10023","article-title":"One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats","author":"brown","year":"2016","journal-title":"AAAI Conference"},{"key":"ref3","article-title":"Detecting False Data Injection Attacks on DC State Estimation","author":"bobba","year":"2010","journal-title":"Workshop on Secure Control Systems CPS Week"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440095"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3057268"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3063386.3063765"},{"journal-title":"Introduction to Stochastic Programming","year":"1997","author":"birge","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2016.7568892"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2461851"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref22","first-page":"4063","article-title":"Stackelberg-game analysis of correlated attacks in cyber-physical systems","author":"zhu","year":"2011","journal-title":"American Control Conference (ACC)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_23"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08472036.pdf?arnumber=8472036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T16:35:10Z","timestamp":1662222910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8472036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8472036","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}