{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:55Z","timestamp":1750306675363,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T00:00:00Z","timestamp":1397520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,15]]},"DOI":"10.1145\/2566468.2566484","type":"proceedings-article","created":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T17:50:38Z","timestamp":1397584238000},"page":"67-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A formal verification approach to revealing stealth attacks on networked control systems"],"prefix":"10.1145","author":[{"given":"Nikola","family":"Trcka","sequence":"first","affiliation":[{"name":"United Technologies Research Center, East Hartford, CT, USA"}]},{"given":"Mark","family":"Moulin","sequence":"additional","affiliation":[{"name":"United Technologies Research Center, East Hartford, CT, USA"}]},{"given":"Shaunak","family":"Bopardikar","sequence":"additional","affiliation":[{"name":"United Technologies Research Center, East Hartford, CT, USA"}]},{"given":"Alberto","family":"Speranzon","sequence":"additional","affiliation":[{"name":"United Technologies Research Center, East Hartford, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/309847.309942"},{"key":"e_1_3_2_1_2_1","unstructured":"C. Baier and J.-P. Katoen. Principles of model checking volume 26202649. MIT press Cambridge 2008.   C. Baier and J.-P. Katoen. Principles of model checking volume 26202649. MIT press Cambridge 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2013.6623749"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622046"},{"key":"e_1_3_2_1_5_1","unstructured":"D. Goodin. Intruders hack industrial heating system using backdoor posted online 2012. Available online at: http:\/\/arstechnica.com\/security\/2012\/12\/intruders-hack-industrial-control-system-using-backdoor-exploit\/.  D. Goodin. Intruders hack industrial heating system using backdoor posted online 2012. Available online at: http:\/\/arstechnica.com\/security\/2012\/12\/intruders-hack-industrial-control-system-using-backdoor-exploit\/."},{"key":"e_1_3_2_1_6_1","unstructured":"F. W. Jr. 'Dr. Chaos' gets seven more years in jail 2005. Available online at: http:\/\/www.scmagazine.com\/dr-chaos-gets-seven-more-years-in-jail\/article\/32757\/.  F. W. Jr. 'Dr. Chaos' gets seven more years in jail 2005. Available online at: http:\/\/www.scmagazine.com\/dr-chaos-gets-seven-more-years-in-jail\/article\/32757\/."},{"key":"e_1_3_2_1_7_1","unstructured":"J. Leyden. Stuxnet 'a game changer for malware defence' 2010. Available online at: http:\/\/www.theregister.co.uk\/2010\/10\/09\/stuxnet\\_enisa\\_response\/.  J. Leyden. Stuxnet 'a game changer for malware defence' 2010. Available online at: http:\/\/www.theregister.co.uk\/2010\/10\/09\/stuxnet\\_enisa\\_response\/."},{"key":"e_1_3_2_1_8_1","unstructured":"MathWorks. Simulink Design Verifier. http:\/\/www.mathworks.com\/products\/sldesignverifier\/.  MathWorks. Simulink Design Verifier. http:\/\/www.mathworks.com\/products\/sldesignverifier\/."},{"volume-title":"IEEE Transaction on Automatic and Control","year":"2012","author":"Pasqualetti F.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3182\/20110828-6-IT-1002.01721"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"volume-title":"Revealing Stealthy Attacks in Control Systems. In 50th Annual Allerton Conf. on Communication, Control and Comp.","year":"2012","author":"Teixeira A.","key":"e_1_3_2_1_12_1"}],"event":{"name":"HiCoNS '14: 3rd International Conference on High Confidence Networked Systems","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Berlin Germany","acronym":"HiCoNS '14"},"container-title":["Proceedings of the 3rd international conference on High confidence networked systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2566468.2566484","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2566468.2566484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:59Z","timestamp":1750230059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2566468.2566484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,15]]},"references-count":12,"alternative-id":["10.1145\/2566468.2566484","10.1145\/2566468"],"URL":"https:\/\/doi.org\/10.1145\/2566468.2566484","relation":{},"subject":[],"published":{"date-parts":[[2014,4,15]]},"assertion":[{"value":"2014-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}