{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T10:17:44Z","timestamp":1760523464387,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/milcom.2016.7795340","type":"proceedings-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T21:49:56Z","timestamp":1482788996000},"page":"283-288","source":"Crossref","is-referenced-by-count":17,"title":["ICS security testbed with delay attack case study"],"prefix":"10.1109","author":[{"given":"Emrah","family":"Korkmaz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrey","family":"Dolgikh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthew","family":"Davis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Victor","family":"Skormin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2013.2248339"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2008.07.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2009.0339"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1511","DOI":"10.1109\/PESW.2002.985276","article-title":"The impact of time delay on robust control design in power systems","volume":"2","author":"wu","year":"2002","journal-title":"Power Engineering Society Winter Meeting 2002 IEEE"},{"journal-title":"Time Delay Compensation in Power System Control","year":"2013","author":"korba","key":"ref14"},{"key":"ref15","first-page":"769","article-title":"On the control of time delay power systems","volume":"9","author":"alrifai","year":"2013","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403400"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2503429"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4236\/ica.2015.64020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2005.844422"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2808783.2808795"},{"key":"ref3","first-page":"15","article-title":"Customized behavioral normalcy profiles for critical infrastructure protection","author":"dolgikh","year":"2013","journal-title":"The 8th Annual Symposium on Information Assurance (ASIA'13)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-1098(03)00167-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2168791"},{"journal-title":"A combined adaptive neural network and nonlinear model predictive control for multirate networked industrial process control","year":"2015","author":"wang","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2206694"},{"year":"2016","key":"ref2","article-title":"The state of security in control systems today"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.021"},{"year":"2016","key":"ref1","article-title":"2015 dell security annual threat report"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.12.006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127454"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351871"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cta:20040822"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2005.1470396"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1016540.1016558"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/251007.251012"}],"event":{"name":"MILCOM 2016 - 2016 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2016,11,1]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2016,11,3]]}},"container-title":["MILCOM 2016 - 2016 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7784513\/7795145\/07795340.pdf?arnumber=7795340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:49:09Z","timestamp":1498373349000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7795340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/milcom.2016.7795340","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}