{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T06:07:34Z","timestamp":1747894054007,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T00:00:00Z","timestamp":1680652800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T00:00:00Z","timestamp":1680652800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,5]]},"DOI":"10.1109\/isqed57927.2023.10129293","type":"proceedings-article","created":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T17:33:09Z","timestamp":1684949589000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Secure Control Loop Execution of Cyber-Physical Devices Using Predictive State Space Checks"],"prefix":"10.1109","author":[{"given":"Kwondo","family":"Ma","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology,Dept of ECE"}]},{"given":"Chandramouli","family":"Amarnath","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,Dept of ECE"}]},{"given":"Abhijit","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,Dept of ECE"}]},{"given":"Jacob A.","family":"Abraham","sequence":"additional","affiliation":[{"name":"University of Texas at Austin,Dept of ECE"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MFI.1996.572236"},{"volume":"275","article-title":"A survey on security control and attack detection for industrial cyber-physical systems","year":"0","key":"ref12"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2013.2258296"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.299"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MDT.2010.7","article-title":"A survey of hardware trojan taxonomy and detection","volume":"27","author":"tehranipoor","year":"2010","journal-title":"IEEE Design & Test of Computers"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.895604"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3182\/20110828-6-IT-1002.01721"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"1828","DOI":"10.1088\/0957-0233\/11\/12\/708","article-title":"Automotive Control Systems: For Engine, Driveline, and Vehicle","volume":"11","author":"kiencke","year":"2000","journal-title":"Measurement Science and Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703172"},{"article-title":"Guidelines for Modeling Cyber-Physical Systems &#x2013; A Three-Layered Architecture for Cyber Physical Systems","year":"2017","author":"boulila","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700180"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2014.44"},{"key":"ref19","first-page":"6","article-title":"Scikit-learn: Machine Learning in Python","author":"pedregosa","year":"0","journal-title":"Machine Learning in Python"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9780367815493"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"ref7","first-page":"1","article-title":"False data injection attacks in control systems","author":"mo","year":"2010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref4","first-page":"15","article-title":"Research challenges for the security of control systems","volume":"5","author":"c\u00e1rdenas","year":"2008","journal-title":"HOTSEC"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2013.6686528"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2009.06.001"}],"event":{"name":"2023 24th International Symposium on Quality Electronic Design (ISQED)","start":{"date-parts":[[2023,4,5]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2023,4,7]]}},"container-title":["2023 24th International Symposium on Quality Electronic Design (ISQED)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10129281\/10129282\/10129293.pdf?arnumber=10129293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T17:44:51Z","timestamp":1687196691000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10129293\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isqed57927.2023.10129293","relation":{},"subject":[],"published":{"date-parts":[[2023,4,5]]}}}