{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T16:51:21Z","timestamp":1762102281459,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.23919\/acc.2018.8430988","type":"proceedings-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T20:16:10Z","timestamp":1534536970000},"page":"5793-5800","source":"Crossref","is-referenced-by-count":3,"title":["Conflict-driven Hybrid Observer-based Anomaly Detection"],"prefix":"10.23919","author":[{"given":"Zheng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Farshad","family":"Harirchi","sequence":"additional","affiliation":[]},{"given":"Dhananjay","family":"Anand","sequence":"additional","affiliation":[]},{"given":"Chee Yee","family":"Tang","sequence":"additional","affiliation":[]},{"given":"James","family":"Moyne","sequence":"additional","affiliation":[]},{"given":"Dawn","family":"Tilbury","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Guaranteed model-based fault detection in cyber-physical systems A model invalidation approach","year":"2016","author":"harirchi","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2004.835009"},{"journal-title":"Auxiliary Signal Design for Failure Detection","year":"2015","author":"campbell","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7525048"},{"key":"ref14","first-page":"76","article-title":"Design of observers for hybrid systems","author":"balluchi","year":"2002","journal-title":"HSCC"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1978.308607"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2016.1278410"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/9.14432"},{"key":"ref18","first-page":"291","article-title":"Reachability of uncertain linear systems using zono-topes","volume":"5","author":"girard","year":"2005","journal-title":"HSCC"},{"journal-title":"Introduction to Discrete Event Systems","year":"2009","author":"cassandras","key":"ref19"},{"journal-title":"Model-Based Fault Diagnosis Techniques Design Schemes Algorithms and Tools","year":"2008","author":"ding","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NESEA.2010.5678065"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/87.486338"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0031-8","author":"sayed-mouchaweh","year":"2014","journal-title":"Diagnosability of discrete event systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2005.850178"},{"journal-title":"Continuous measurements and quantitative constraints Challenge problems for discrete modeling techniques","year":"2001","author":"goodrich","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2017.2714135"},{"key":"ref1","first-page":"5","article-title":"Challenges for securing cyber physical systems","author":"cardenas","year":"2009","journal-title":"CPSSW"},{"key":"ref9","article-title":"Active model discrimination with applications to fraud detection in smart buildings","author":"harirchi","year":"2017","journal-title":"IFAC WC"},{"key":"ref20","article-title":"False data injection attacks in control systems","author":"mo","year":"2010","journal-title":"Proc SCS 1st Workshop"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.2016.0689"}],"event":{"name":"2018 Annual American Control Conference (ACC)","start":{"date-parts":[[2018,6,27]]},"location":"Milwaukee, WI","end":{"date-parts":[[2018,6,29]]}},"container-title":["2018 Annual American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410068\/8430677\/08430988.pdf?arnumber=8430988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:26:49Z","timestamp":1598236009000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8430988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/acc.2018.8430988","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}