{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:09:36Z","timestamp":1772122176027,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T00:00:00Z","timestamp":1719273600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T00:00:00Z","timestamp":1719273600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,25]]},"DOI":"10.23919\/ecc64448.2024.10590869","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T17:48:23Z","timestamp":1721843303000},"page":"2560-2567","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Sensor Attack Detection and Mitigating Sensor Compromise Impact in a Switching-Based Moving Target Defense"],"prefix":"10.23919","author":[{"given":"Anas","family":"Alhashimi","sequence":"first","affiliation":[{"name":"M&#x00E4;lardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]},{"given":"Thomas","family":"Nolte","sequence":"additional","affiliation":[{"name":"M&#x00E4;lardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]},{"given":"Alessandro V.","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"M&#x00E4;lardalen University,V&#x00E4;ster&#x00E5;s,Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2011.555586"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77028-4_15"},{"key":"ref4","first-page":"1","article-title":"Triton: The first ics cyber attack on safety instrument systems","volume":"2018","author":"Di Pinto","year":"2018","journal-title":"Proc. Black Hat USA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663479"},{"key":"ref6","article-title":"A moving target defense to reveal cyber-attacks in cps and minimize their impact","volume-title":"American Control Conference, 2019","author":"Giraldo"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2022.101268"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s23084013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-019-1906-z"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3215579"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663482"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7403134"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3005686"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.111163"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2915746"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3129195"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3144937"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3176246"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DDCLS52934.2021.9455461"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2351671"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2022.3144337"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2989773"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/080726720"}],"event":{"name":"2024 European Control Conference (ECC)","location":"Stockholm, Sweden","start":{"date-parts":[[2024,6,25]]},"end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 European Control Conference (ECC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10590709\/10590710\/10590869.pdf?arnumber=10590869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T05:53:20Z","timestamp":1721886800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10590869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,25]]},"references-count":24,"URL":"https:\/\/doi.org\/10.23919\/ecc64448.2024.10590869","relation":{},"subject":[],"published":{"date-parts":[[2024,6,25]]}}}