{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T04:35:10Z","timestamp":1778646910053,"version":"3.51.4"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.23919\/ecc.2019.8795791","type":"proceedings-article","created":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T19:20:02Z","timestamp":1565896802000},"page":"4368-4373","source":"Crossref","is-referenced-by-count":8,"title":["Modeling of Cyber Attacks and a Time Guard Detection for ICS based on Discrete Event Systems"],"prefix":"10.23919","author":[{"given":"Raphael","family":"Fritz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrick","family":"Schwarz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"ref11","article-title":"Detecting false data injection attacks on dc state estimation","volume":"2010","author":"bobba","year":"0","journal-title":"Preprints of the First Workshop on Secure Control Systems CPSWEEK"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"90","DOI":"10.3182\/20110828-6-IT-1002.01721","article-title":"A decoupled feedback structure for covertly appropriating networked control systems","volume":"44","author":"smith","year":"0","journal-title":"IFAC Proceedings Volumes"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999603"},{"key":"ref15","author":"laubscher","year":"2016","journal-title":"Entwurf und Analyse einer Cloud-basierten Steuerung einer Fertigungslinie (Design and analysis of a cloud based control for a production plant)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DCDS.2011.5970315"},{"key":"ref17","author":"cassandras","year":"2009","journal-title":"Introduction to Discrete Event Systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2011.02.008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.04.006"},{"key":"ref3","first-page":"179","article-title":"Detectable and undetectable network attack security of cyber-physical systems","volume":"51","author":"lima","year":"0","journal-title":"Proceedings of the Workshop on Discrete Event Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8264281"},{"key":"ref5","author":"wakaiki","year":"2017","journal-title":"Supervisory control of discrete-event systems under attacks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2018.06.314"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502501"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.07.017"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.377810"},{"key":"ref9","author":"frey","year":"2002","journal-title":"Design and formal analysis of Petri net based logic control algorithms"}],"event":{"name":"2019 18th European Control Conference (ECC)","location":"Naples, Italy","start":{"date-parts":[[2019,6,25]]},"end":{"date-parts":[[2019,6,28]]}},"container-title":["2019 18th European Control Conference (ECC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8778424\/8795605\/08795791.pdf?arnumber=8795791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T21:35:45Z","timestamp":1567460145000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8795791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.23919\/ecc.2019.8795791","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}