{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:21:35Z","timestamp":1773840095727,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Sci. Eng."],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/tase.2019.2963257","type":"journal-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T23:41:23Z","timestamp":1580946083000},"page":"1030-1043","source":"Crossref","is-referenced-by-count":44,"title":["A Recursive Watermark Method for Hard Real-Time Industrial Control System Cyber-Resilience Enhancement"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7599-3818","authenticated-orcid":false,"given":"Zhen","family":"Song","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3323-4482","authenticated-orcid":false,"given":"Antun","family":"Skuric","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7396-8037","authenticated-orcid":false,"given":"Kun","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262842"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on SCADA systems","volume":"22","author":"mo","year":"2014","journal-title":"IEEE Trans Control Syst Technol"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-017-0060-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2712162"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2016.7508162"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref37","author":"bakhtiari","year":"1995","journal-title":"Cryptographic hash functions A survey"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"19235","DOI":"10.1007\/s11042-017-5351-0","article-title":"A semi-blind HVS based image watermarking scheme using elliptic curve cryptography","volume":"77","author":"jain","year":"2018","journal-title":"Multimedia Tools Appl"},{"key":"ref35","first-page":"603","article-title":"A novel fuzzy frame selection based watermarking scheme for MPEG-4 videos using bi-directional extreme learning machine","author":"bala","year":"0","journal-title":"Appl Soft Comput J"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.008"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2756027"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1976.10411"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ESTS.2005.1524645"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.900643"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2006.886993"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISAP.2005.1599264"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MELE.2015.2413434"},{"key":"ref16","article-title":"Design considerations for a reference MVDC power system","author":"amy","year":"2016","journal-title":"SNAME Maritime Conv"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s16040443"},{"key":"ref18","article-title":"Classifications of industrial control system cyber attacks","author":"morris","year":"2013","journal-title":"Proc 1st Int Symp ICS SCADA Cyber Secur Res"},{"key":"ref19","first-page":"21","article-title":"Revisiting a watermark-based detection scheme to handle cyber-physical attacks","author":"rubio-hern\u00e1n","year":"2016","journal-title":"Proc 8th Int Conf Availability Rel Secur (ARES)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2003.1272997"},{"key":"ref4","author":"falliere","year":"2011","journal-title":"W32 Stuxnet Dossier Security Response 5 6 Symantec Corp"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2731780"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"mo","year":"2015","journal-title":"IEEE Control Syst"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.004"},{"key":"ref7","year":"0","journal-title":"Profinet Real-time Communication"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICSCSR2013.3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.2017.2692058"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2501288"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/41.149750"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ASCC.2017.8287297"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref42","year":"2019","journal-title":"Programming Guideline for S7-1200\/S7-1500"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3182\/20140824-6-ZA-1003.02668"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(71)90028-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPAS.1965.4766135"},{"key":"ref26","author":"ljung","year":"1999","journal-title":"System Identification"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2012.2231884"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185514"}],"container-title":["IEEE Transactions on Automation Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8856\/9058744\/08984338.pdf?arnumber=8984338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:43:10Z","timestamp":1651077790000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8984338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":45,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tase.2019.2963257","relation":{},"ISSN":["1545-5955","1558-3783"],"issn-type":[{"value":"1545-5955","type":"print"},{"value":"1558-3783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}