{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:10:13Z","timestamp":1755843013277,"version":"3.44.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T00:00:00Z","timestamp":1751932800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,8]]},"DOI":"10.23919\/acc63710.2025.11107455","type":"proceedings-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:17:51Z","timestamp":1755800271000},"page":"3403-3408","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Resilience of Cyberattack Detection Using Lyapunov-Based Economic Model Predictive Control to Data Poisoning"],"prefix":"10.23919","author":[{"given":"Helen","family":"Durand","sequence":"first","affiliation":[{"name":"Wayne State University,Department of Chemical Engineering and Materials Science"}]},{"given":"Akkarakaran Francis","family":"Leonard","sequence":"additional","affiliation":[{"name":"Wayne State University,Department of Chemical Engineering and Materials Science"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/catal11111304"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1021\/acs.iecr.1c04728"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/aic.15430"},{"key":"ref4","article-title":"False data injection attacks in control systems","volume-title":"Preprints of the 1st workshop on Secure Control Systems","volume":"1","author":"Mo"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1520\/SSMS20180025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/aic.12672"},{"key":"ref7","article-title":"Control system cyberattack detection using Lyapunov-based economic model predictive control","author":"Oyama","year":"2020","journal-title":"IFAC World Congress"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/aic.14683"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6911(91)90111-Q"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/aic.17084"}],"event":{"name":"2025 American Control Conference (ACC)","start":{"date-parts":[[2025,7,8]]},"location":"Denver, CO, USA","end":{"date-parts":[[2025,7,10]]}},"container-title":["2025 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11107441\/11107442\/11107455.pdf?arnumber=11107455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:33:07Z","timestamp":1755840787000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11107455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.23919\/acc63710.2025.11107455","relation":{},"subject":[],"published":{"date-parts":[[2025,7,8]]}}}