{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T15:00:05Z","timestamp":1776956405043,"version":"3.51.4"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030616373","type":"print"},{"value":"9783030616380","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61638-0_16","type":"book-chapter","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:08:28Z","timestamp":1602630508000},"page":"274-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Investigation of Cyber Attacks on a Water Distribution System"],"prefix":"10.1007","author":[{"given":"Sridhar","family":"Adepu","sequence":"first","affiliation":[]},{"given":"Venkata Reddy","family":"Palleti","sequence":"additional","affiliation":[]},{"given":"Gyanendra","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Aditya","family":"Mathur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"key":"16_CR1","unstructured":"Abrams, M., Weiss, J.: Malicious control system cyber security attack case study-Maroochy Water Services. The MITRE Corporation, Australia (2008)"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-12786-2_3","volume-title":"Computer Security","author":"S Adepu","year":"2019","unstructured":"Adepu, S., Kandasamy, N.K., Mathur, A.: EPIC: an electric power testbed for research and training in cyber physical systems security. In: Katsikas, S.K., et al. (eds.) SECPRE\/CyberICPS -2018. LNCS, vol. 11387, pp. 37\u201352. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-12786-2_3"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Adepu, S., Mathur, A.: Distributed detection of single-stage multipoint cyber attacks in a water treatment plant. In: Proceedings of the 11th ASIACCS, pp. 449\u2013460 (2016)","DOI":"10.1145\/2897845.2897855"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Adepu, S., Mathur, A.: Generalized attacker and attack models for cyber physical systems. In: 2016 IEEE 40th Annual COMPSAC, vol. 1, pp. 283\u2013292 (2016)","DOI":"10.1109\/COMPSAC.2016.122"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Adepu, S., Mathur, A.: Assessing the effectiveness of attack detection at a hackfest on industrial control systems. IEEE Trans. Sustain. Comput. (2018)","DOI":"10.1109\/TSUSC.2018.2878597"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Adepu, S., Mishra, G., Mathur, A.: Access control in water distribution networks: a case study. In: QRS (2017)","DOI":"10.1109\/QRS.2017.58"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Palleti, V.R., Mathur, A.: WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: 3rd CysWater (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Amin, S., Litrico, X., Sastry, S., Bayen, A.: Cyber security of water SCADA systems; Part I: analysis and experimentation of stealthy deception attacks. IEEE Trans. Control Syst. Technol. (2013)","DOI":"10.1109\/TCST.2012.2211873"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Amin, S., Litrico, X., Sastry, S., Bayen, A.: Cyber security of water SCADA systems; Part II: attack detection using enhanced hydrodynamic models. IEEE Trans. Control Syst. Technol. (2013)","DOI":"10.1109\/TCST.2012.2211874"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Antonioli, D., Ghaeini, H.R., Adepu, S., Ochoa, M., Tippenhauer, N.O.: Gamifying ICS security training and research: design, implementation, and results of S3. In: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, pp. 93\u2013102. ACM (2017)","DOI":"10.1145\/3140241.3140253"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Baig, Z., Ahmad, S., Sait, S.: Detecting intrusive activity in the smart grid communications infrastructure using self-organizing maps. In: 12th IEEE TrustCom, pp. 1594\u20131599, July 2013","DOI":"10.1109\/TrustCom.2013.196"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Bhave, A., Krogh, B., Garlan, D., Schmerl, B.: View consistency in architectures for cyber-physical systems. In: Proceedings of the 2nd ACM\/IEEE International Conference on Cyber-Physical Systems (2011)","DOI":"10.1109\/ICCPS.2011.17"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Chen, B., et al.: Go with the flow: toward workflow-oriented security assessment. In: Proceedings of the 2013 Workshop on New Security Paradigms Workshop. NSPW 2013, pp. 65\u201376 (2013)","DOI":"10.1145\/2535813.2535821"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Chen, Y., Poskitt, C.M., Sun, J.: Learning from mutants: using code mutation to learn and monitor invariants of a cyber-physical system. In: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2018) (2018)","DOI":"10.1109\/SP.2018.00016"},{"key":"16_CR15","unstructured":"ICS-CERT Advisories. \nhttps:\/\/ics-cert.us-cert.gov\/advisories"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Frey, S., Rashid, A., Anthonysamy, P., Pinto-Albuquerque, M., Naqvi, S.A.: The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game. IEEE Trans. Softw. Eng. (2018)","DOI":"10.1145\/3180155.3182549"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Gamage, T., McMillin, B., Roth, T.: Enforcing information flow security properties in cyber-physical systems: a generalized framework based on compensation. In: IEEE 34th Annual COMPSACW, pp. 158\u2013163 (2010)","DOI":"10.1109\/COMPSACW.2010.36"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber physical systems using recurrent neural networks. In: 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 140\u2013145. IEEE (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"16_CR19","unstructured":"Homeland Security: DHS common cybersecurity vulnerabilities in ICS. \nhttps:\/\/ics-cert.us-cert.gov\/sites\/default\/files\/recommended_practices\/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf"},{"key":"16_CR20","unstructured":"Jajodia, S., Noel, S.: Advanced cyber attack modeling, analysis, and visualization. Technical report AFRL-RI-RS-TR-2010-078. Final Technical Report, George Mason University, March 2010"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Kang, E., Adepu, S., Jackson, D., Mathur, A.P.: Model-based security analysis of a water treatment system. In: In Proceedings of 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, May 2016","DOI":"10.1145\/2897035.2897041"},{"key":"16_CR22","unstructured":"Kasper Sky: Industrial control systems vulnerabilities statistics. \nhttps:\/\/kasperskycontenthub.com\/securelist\/files\/2016\/07\/KL_REPORT_ICS_Statistic_vulnerabilities.pdf"},{"key":"16_CR23","unstructured":"Kwon, C., Liu, W., Hwang, I.: Security analysis for cyber-physical systems against stealthy deception attacks. In: ACC, pp. 3344\u20133349 (2013)"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Lin, Q., Adepu, S., Verwer, S., Mathur, A.: Tabor: a graphical model-based approach for anomaly detection in industrial control systems. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 525\u2013536. ACM (2018)","DOI":"10.1145\/3196494.3196546"},{"key":"16_CR25","unstructured":"Microsoft: Activex controls. \nhttps:\/\/msdn.microsoft.com\/en-us\/library\/aa751968(v=vs.85).aspx"},{"issue":"4","key":"16_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"16_CR27","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.compchemeng.2015.12.022","volume":"87","author":"VR Palleti","year":"2016","unstructured":"Palleti, V.R., Narasimhan, S., Rengaswamy, R., Teja, R., Bhallamudi, S.M.: Sensor network design for contaminant detection and identification in water distribution networks. Comput. Chem. Eng. 87, 246\u2013256 (2016)","journal-title":"Comput. Chem. Eng."},{"key":"16_CR28","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.jprocont.2018.05.005","volume":"68","author":"VR Palleti","year":"2018","unstructured":"Palleti, V.R., Tan, Y.C., Samavedham, L.: A mechanistic fault detection and isolation approach using Kalman filter to improve the security of cyber physical systems. J. Process Control 68, 160\u2013170 (2018)","journal-title":"J. Process Control"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Patlolla, S.S., McMillin, B., Adepu, S., Mathur, A.: An approach for formal analysis of the security of a water treatment testbed. In: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 115\u2013124. IEEE (2018)","DOI":"10.1109\/PRDC.2018.00022"},{"key":"16_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-45741-3_22","volume-title":"Computer Security \u2013 ESORICS 2016","author":"M Rocchetto","year":"2016","unstructured":"Rocchetto, M., Tippenhauer, N.O.: On attacker models and profiles for cyber-physical systems. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 427\u2013449. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-45741-3_22"},{"key":"16_CR31","unstructured":"Rupp, M.: Honeywell XL web II controller vulnerabilities. \nhttps:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-17-033-01"},{"issue":"5","key":"16_CR32","doi-asserted-by":"publisher","first-page":"04017009","DOI":"10.1061\/(ASCE)WR.1943-5452.0000749","volume":"143","author":"R Taormina","year":"2017","unstructured":"Taormina, R., Galelli, S., Tippenhauer, N.O., Salomons, E., Ostfeld, A.: Characterizing cyber-physical attacks on water distribution systems. J. Water Resour. Plann. Manag. 143(5), 04017009 (2017)","journal-title":"J. Water Resour. Plann. Manag."},{"issue":"8","key":"16_CR33","doi-asserted-by":"publisher","first-page":"04018048","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969","volume":"144","author":"R Taormina","year":"2018","unstructured":"Taormina, R., et al.: Battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J. Water Resour. Plann. Manag. 144(8), 04018048 (2018)","journal-title":"J. Water Resour. Plann. Manag."}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61638-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:26:47Z","timestamp":1602631607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61638-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030616373","9783030616380"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61638-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/di.uniroma1.it\/ACNS2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"214","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}