@phdthesis{Keith,
  title={Structural aspects of system identification},
  author={Glover, Keith},
  year={1973},
  school={Massachusetts Inst. of Technology}
}

@article{Chen_2010,
  doi = {10.1109/mnet.2010.5634434},
  url = {http://dx.doi.org/10.1109/mnet.2010.5634434},
  year = {2010},
  month = {nov},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {24},
  number = {6},
  pages = {2--3},
  author = {Thomas Chen},
  title = {{Stuxnet the real start of cyber warfare? [Editor{\textquotesingle}s Note}},
  journal = {{IEEE} Network},
}


@article{Fidler_2011,
  doi = {10.1109/msp.2011.96},
  url = {http://dx.doi.org/10.1109/msp.2011.96},
  year = {2011},
  month = {jul},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {9},
  number = {4},
  pages = {56--59},
  author = {David P. Fidler},
  title = {{Was Stuxnet an Act of War? Decoding a Cyberattack}},
  journal = {{IEEE} Security {\&} Privacy Magazine},
}


@inproceedings{Liu_2009,
  doi = {10.1145/1653662.1653666},
  url = {http://dx.doi.org/10.1145/1653662.1653666},
  year = {2009},
  publisher = {Association for Computing Machinery ({ACM})},
  author = {Yao Liu and Michael K. Reiter and Peng Ning},
  title = {{False data injection attacks against state estimation in electric power grids}},
  booktitle = {Proceedings of the 16th {ACM} conference on Computer and communications security - {CCS} {\textquotesingle}09},
}


@article{Sundaram_2011,
  doi = {10.1109/tac.2010.2088690},
  url = {http://dx.doi.org/10.1109/tac.2010.2088690},
  year = {2011},
  month = {jul},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {56},
  number = {7},
  pages = {1495--1508},
  author = {Shreyas Sundaram and Christoforos N. Hadjicostis},
  title = {{Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents}},
  journal = {{IEEE} Transactions on Automatic Control},
}


@article{Pasqualetti_2013,
  doi = {10.1109/tac.2013.2266831},
  url = {http://dx.doi.org/10.1109/tac.2013.2266831},
  year = {2013},
  month = {nov},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {58},
  number = {11},
  pages = {2715--2729},
  author = {Fabio Pasqualetti and Florian Dorfler and Francesco Bullo},
  title = {{Attack Detection and Identification in Cyber-Physical Systems}},
  journal = {{IEEE} Transactions on Automatic Control},
}


@article{Fawzi_2014,
  doi = {10.1109/tac.2014.2303233},
  url = {http://dx.doi.org/10.1109/tac.2014.2303233},
  year = {2014},
  month = {jun},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {59},
  number = {6},
  pages = {1454--1467},
  author = {Hamza Fawzi and Paulo Tabuada and Suhas Diggavi},
  title = {{Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks}},
  journal = {{IEEE} Transactions on Automatic Control},
}


@article{Teixeira_2015a,
  doi = {10.1109/mcs.2014.2364709},
  url = {http://dx.doi.org/10.1109/mcs.2014.2364709},
  year = {2015},
  month = {feb},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {35},
  number = {1},
  pages = {24--45},
  author = {Andre Teixeira and Kin Cheong Sou and Henrik Sandberg and Karl Henrik Johansson},
  title = {{Secure Control Systems: A Quantitative Risk Management Approach}},
  journal = {{IEEE} Control Systems},
}


@article{Mo_2014,
  doi = {10.1109/tcst.2013.2280899},
  url = {http://dx.doi.org/10.1109/tcst.2013.2280899},
  year = {2014},
  month = {jul},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {22},
  number = {4},
  pages = {1396--1407},
  author = {Yilin Mo and Rohan Chabukswar and Bruno Sinopoli},
  title = {{Detecting Integrity Attacks on {SCADA} Systems}},
  journal = {{IEEE} Transactions on Control Systems Technology},
}


@article{Mo_2015,
  doi = {10.1109/mcs.2014.2364724},
  url = {http://dx.doi.org/10.1109/mcs.2014.2364724},
  year = {2015},
  month = {feb},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {35},
  number = {1},
  pages = {93--109},
  author = {Yilin Mo and Sean Weerakkody and Bruno Sinopoli},
  title = {{Physical Authentication of Control Systems: Designing Watermarked Control Inputs to Detect Counterfeit Sensor Outputs}},
  journal = {{IEEE} Control Systems},
}


@inproceedings{Roy_2011,
  doi = {10.3182/20110828-6-it-1002.01721},
  url = {http://dx.doi.org/10.3182/20110828-6-it-1002.01721},
  year = {2011},
  month = {aug},
  publisher = {Elsevier {BV}},
  author = {Smith Roy},
  editor = {Bittanti, Sergio},
  title = {{A Decoupled Feedback Structure for Covertly Appropriating Networked Control Systems}},
  booktitle = {Proceedings of the 18th {IFAC} World Congress},
}


@article{Teixeira_2015,
  doi = {10.1016/j.automatica.2014.10.067},
  url = {http://dx.doi.org/10.1016/j.automatica.2014.10.067},
  year = {2015},
  month = {jan},
  publisher = {Elsevier {BV}},
  volume = {51},
  pages = {135--148},
  author = {Andr{\'{e}} Teixeira and Iman Shames and Henrik Sandberg and Karl Henrik Johansson},
  title = {{A secure control framework for resource-limited adversaries}},
  journal = {Automatica},
}


@inproceedings{Koscher_2010,
  doi = {10.1109/sp.2010.34},
  url = {http://dx.doi.org/10.1109/sp.2010.34},
  year = {2010},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  author = {Karl Koscher and Alexei Czeskis and Franziska Roesner and Shwetak Patel and Tadayoshi Kohno and Stephen Checkoway and Damon McCoy and Brian Kantor and Danny Anderson and Hovav Shacham and Stefan Savage},
  title = {{Experimental Security Analysis of a Modern Automobile}},
  booktitle = {2010 {IEEE} Symposium on Security and Privacy},
}


@article{Ng_1977,
  doi = {10.1016/0005-1098(77)90068-1},
  url = {http://dx.doi.org/10.1016/0005-1098(77)90068-1},
  year = {1977},
  month = {sep},
  publisher = {Elsevier {BV}},
  volume = {13},
  number = {5},
  pages = {477--485},
  author = {T.S. Ng and G.C. Goodwin and B.D.O. Anderson},
  title = {{Identifiability of {MIMO} linear dynamic systems operating in closed loop}},
  journal = {Automatica},
}


@article{Anderson_1967,
  doi = {10.1109/tac.1967.1098646},
  url = {http://dx.doi.org/10.1109/tac.1967.1098646},
  year = {1967},
  month = {aug},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {12},
  number = {4},
  pages = {410--414},
  author = {B. Anderson},
  title = {{An algebraic solution to the spectral factorization problem}},
  journal = {{IEEE} Transactions on Automatic Control},
}


@article{Anderson_1982,
  doi = {10.1016/0005-1098(82)90108-x},
  url = {http://dx.doi.org/10.1016/0005-1098(82)90108-x},
  year = {1982},
  month = {mar},
  publisher = {Elsevier {BV}},
  volume = {18},
  number = {2},
  pages = {195--213},
  author = {B.D.O. Anderson and M.R. Gevers},
  title = {{Identifiability of linear stochastic systems operating under linear feedback}},
  journal = {Automatica},
}


@article{Anderson_1969,
  doi = {10.1007/bf01007246},
  url = {http://dx.doi.org/10.1007/bf01007246},
  year = {1969},
  publisher = {Springer Science $\mathplus$ Business Media},
  volume = {1},
  number = {1},
  pages = {133--147},
  author = {Brian D. O. Anderson},
  title = {{The inverse problem of stationary covariance generation}},
  journal = {Journal of Statistical Physics},
}


@article{Schenato_2007,
  doi = {10.1109/jproc.2006.887306},
  url = {http://dx.doi.org/10.1109/jproc.2006.887306},
  year = {2007},
  month = {jan},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {95},
  number = {1},
  pages = {163--187},
  author = {Luca Schenato and Bruno Sinopoli and Massimo Franceschetti and Kameshwar Poolla and S. Shankar Sastry},
  title = {{Foundations of Control and Estimation Over Lossy Networks}},
  journal = {Proceedings of the {IEEE}},
}


@article{Sinopoli_2004,
  doi = {10.1109/tac.2004.834121},
  url = {http://dx.doi.org/10.1109/tac.2004.834121},
  year = {2004},
  month = {sep},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  volume = {49},
  number = {9},
  pages = {1453--1464},
  author = {B. Sinopoli and L. Schenato and M. Franceschetti and K. Poolla and M.I. Jordan and S.S. Sastry},
  title = {{Kalman Filtering With Intermittent Observations}},
  journal = {{IEEE} Transactions on Automatic Control},
}


@inproceedings{Hayden_2014,
  doi = {10.1109/acc.2014.6859298},
  url = {http://dx.doi.org/10.1109/acc.2014.6859298},
  year = {2014},
  month = {jun},
  publisher = {Institute of Electrical {\&} Electronics Engineers ({IEEE})},
  author = {David Hayden and Ye Yuan and Jorge Goncalves},
  title = {{Network reconstruction from intrinsic noise: Minimum-phase systems}},
  booktitle = {2014 American Control Conference},
}