{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:27:40Z","timestamp":1730341660145,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,25]]},"DOI":"10.23919\/acc50511.2021.9483078","type":"proceedings-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T20:29:16Z","timestamp":1627504156000},"page":"4649-4654","source":"Crossref","is-referenced-by-count":1,"title":["Covert Channels in Cyber-Physical Systems"],"prefix":"10.23919","author":[{"given":"Ahmed","family":"Abdelwahab","sequence":"first","affiliation":[]},{"given":"Walter","family":"Lucia","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3338499.3357358"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3302509.3313783"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2833063"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2014.7007771"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SOSCYPS.2016.7580002"},{"key":"ref15","volume":"104","author":"zhou","year":"1998","journal-title":"Essentials of Robust Control"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0109870"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-8176-4606-6","author":"bianchini","year":"2008","journal-title":"Set-Theoretic Methods in Control"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16435-4_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062145"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2007.4317620"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357374"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.40"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.26"},{"journal-title":"Department of Defense Trusted Computer System Evaluation Criteria","year":"1986","author":"latham","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359794"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362375.362389"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.01.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2012009"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/9.664150"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2008.04.027"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/37.793443"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2013.6669862"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.843854"}],"event":{"name":"2021 American Control Conference (ACC)","start":{"date-parts":[[2021,5,25]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2021,5,28]]}},"container-title":["2021 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9482409\/9482614\/09483078.pdf?arnumber=9483078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T20:54:13Z","timestamp":1635800053000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9483078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":26,"URL":"https:\/\/doi.org\/10.23919\/acc50511.2021.9483078","relation":{},"subject":[],"published":{"date-parts":[[2021,5,25]]}}}