{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:54:58Z","timestamp":1730303698180,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/vss.2018.8460426","type":"proceedings-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T22:29:26Z","timestamp":1537568966000},"page":"285-290","source":"Crossref","is-referenced-by-count":13,"title":["Cyber-Attack Reconstruction via Sliding Mode Differentiation and Sparse Recovery Algorithm: Electrical Power Networks Application"],"prefix":"10.1109","author":[{"given":"Shamila","family":"Nateghi","sequence":"first","affiliation":[]},{"given":"Y.","family":"Shtessel","sequence":"additional","affiliation":[]},{"given":"J-P","family":"Barbot","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2492159"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.09.028"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514278"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010241"},{"key":"ref16","first-page":"244","article-title":"Towards a framework for cyber attack impact analysis of the electric smart grid","author":"kundur","year":"2010","journal-title":"IEEE Int Conf Smart Grid Commun"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2785355"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.1198"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-650-4","author":"alwi","year":"2011","journal-title":"Fault Detection and Fault-tolerant Control Using Sliding Modes"},{"journal-title":"Power System Dynamics and Stability","year":"1998","author":"sauer","key":"ref28"},{"key":"ref4","first-page":"495","article-title":"Secure Control: Towards Survivable Cyber-Physical Systems","author":"c\u00e1rdenas","year":"2008","journal-title":"The 28th International Conference on Distributed Computing Systems Workshops"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1214\/009053606000001523"},{"journal-title":"Internet Security Glossary","year":"2000","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"journal-title":"Observer-based monitors and distributed wave controllers for electromechanical disturbances in power systems","year":"2004","author":"scholtz","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2279896"},{"journal-title":"Introduction to Embedded Systems A Cyber-physical Systems Approach","year":"2016","author":"lee","key":"ref8"},{"key":"ref7","first-page":"911","article-title":"Secure control against replay attacks","author":"mo","year":"2010","journal-title":"Proc Allerton Conf Communications Control Computing"},{"journal-title":"Computer Security Art and Science","year":"2003","author":"bishop","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1109\/MCS.2014.2364725","article-title":"Control-Theoretic Methods for Cyber-physical Security: Geometric Principle for Optimal Cross-Layer Resilient Control Systems","volume":"35","author":"pasqualetti","year":"2015","journal-title":"IEEE Control Systems Magazine"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5634434"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2745468"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1969.1099133"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1969.1099169"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.04.009"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1587\/transcom.E96.B.685","article-title":"A user's guide to compressed sensing for communication systems","volume":"96","author":"hayashi","year":"2013","journal-title":"IEICE Trans Information and Communication"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/S1064827596304010"}],"event":{"name":"2018 15th International Workshop on Variable Structure Systems (VSS)","start":{"date-parts":[[2018,7,9]]},"location":"Graz","end":{"date-parts":[[2018,7,11]]}},"container-title":["2018 15th International Workshop on Variable Structure Systems (VSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8428393\/8460209\/08460426.pdf?arnumber=8460426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:00:12Z","timestamp":1598248812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8460426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/vss.2018.8460426","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}