{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:46:15Z","timestamp":1756464375152,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"Department of Energy","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/acc50511.2021.9482664","type":"proceedings-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T20:29:16Z","timestamp":1627504156000},"page":"3273-3280","source":"Crossref","is-referenced-by-count":1,"title":["Cyber-Security of Decentralized and Distributed Control Architectures with Machine-Learning Detectors for Nonlinear Processes"],"prefix":"10.23919","author":[{"given":"Scarlett","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Panagiotis D.","family":"Christofides","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6911(91)90111-Q"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/aic.11801"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cta.2018.5868"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2007.911160"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/13715-1478"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2016.2535119"},{"key":"ref16","first-page":"4349","article-title":"A survey on machine learning techniques for intrusion detection systems","volume":"2","author":"singh","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref17","first-page":"800","author":"stouffer","year":"2011","journal-title":"Guide to industrial control systems (ICS) security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524899"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cherd.2020.07.019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/aic.16907"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2012.05.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/aic.17013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-033-5_5"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2008.03.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2016.7456805"}],"event":{"name":"2021 American Control Conference (ACC)","start":{"date-parts":[[2021,5,25]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9482409\/9482614\/09482664.pdf?arnumber=9482664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T10:52:05Z","timestamp":1633517525000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9482664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/acc50511.2021.9482664","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}