{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:24:36Z","timestamp":1776277476468,"version":"3.50.1"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1505701"],"award-info":[{"award-number":["CNS-1505701"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1505799"],"award-info":[{"award-number":["CNS-1505799"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Intel-NSF Partnership for Cyber-Physical Systems Security and Privacy"},{"DOI":"10.13039\/100000185","name":"DARPA","doi-asserted-by":"publisher","award":["FA8750-12-2-0247"],"award-info":[{"award-number":["FA8750-12-2-0247"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Control Netw. Syst."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/tcns.2016.2607420","type":"journal-article","created":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T18:21:14Z","timestamp":1473358874000},"page":"82-92","source":"Crossref","is-referenced-by-count":160,"title":["Attack-Resilient State Estimation for Noisy Dynamical Systems"],"prefix":"10.1109","volume":"4","author":[{"given":"Miroslav","family":"Pajic","sequence":"first","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]},{"given":"George J.","family":"Pappas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2163807"},{"key":"ref32","article-title":"Event-triggered state observers for sparse sensor noise\/attacks","volume":"pp","author":"shoukry","year":"2015","journal-title":"IEEE Trans Autom Control"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403135"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2013.08.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref11","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"warner","year":"2002","journal-title":"J Security Admin"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-3-642-40349-1_4","article-title":"Non-invasive spoofing attacks for anti-lock braking systems","author":"shoukry","year":"2013","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2013"},{"key":"ref14","first-page":"90","article-title":"A decoupled feedback structure for covertly appropriating networked control systems","author":"smith","year":"2011","journal-title":"Proc IFAC World Congr"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5717166"},{"key":"ref18","first-page":"1854","article-title":"Stochastic game approach for replay attack detection","author":"miao","year":"0","journal-title":"Proc 52nd IEEE Conf Dec Control"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","article-title":"Detecting integrity attacks on scada systems","volume":"22","author":"mo","year":"2014","journal-title":"IEEE Trans Control Syst Technol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2044837"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.115"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.67"},{"key":"ref6","article-title":"Comprehensive experimental analyses of automotive attack surfaces","author":"checkoway","year":"0","journal-title":"Proc Usenix Security Symp"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2293654"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref8","article-title":"Iran hijacked US drone, says Iranian engineer","author":"peterson","year":"2011","journal-title":"Christian Science Monitor"},{"key":"ref7","article-title":"Hackers remotely kill a jeep on the highway","author":"greenberg","year":"0"},{"key":"ref2","first-page":"73","article-title":"Lessons learned from the maroochy water breach","author":"slay","year":"2008","journal-title":"Critical Infrastructure Protection"},{"key":"ref9","first-page":"30","article-title":"Drone hack: Spoofing attack demonstration on a civilian unmanned aerial vehicle","volume":"23","author":"shepard","year":"2012","journal-title":"GPS World"},{"key":"ref1","article-title":"Research challenges for the security of control systems","author":"cardenas","year":"0","journal-title":"Proc Usenix Workshop Hot Topics in Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"ref22","first-page":"3344","article-title":"Security analysis for cyber-physical systems against stealthy deception attacks","author":"kwon","year":"0","journal-title":"Proc Amer Control Conf"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","article-title":"Cyber-physical security of a smart grid infrastructure","volume":"100","author":"mo","year":"2012","journal-title":"Proc IEEE"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2014.6843720"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2015.7171925"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.860430"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511794308.002"}],"container-title":["IEEE Transactions on Control of Network Systems"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/6509490\/7879955\/7563303-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6509490\/7879955\/07563303.pdf?arnumber=7563303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:54:20Z","timestamp":1649444060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7563303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcns.2016.2607420","relation":{},"ISSN":["2325-5870"],"issn-type":[{"value":"2325-5870","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}