{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T21:32:25Z","timestamp":1773955945852,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030697808","type":"print"},{"value":"9783030697815","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69781-5_9","type":"book-chapter","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T11:12:22Z","timestamp":1613733142000},"page":"123-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning Based CPS Security Research"],"prefix":"10.1007","author":[{"given":"Chuadhry Mujeeb","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Nandha Kumar","family":"Kandasamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"9_CR1","unstructured":"Adepu, S., Mathur, A.: Distributed attack detection in a water treatment plant: method and case study. IEEE Trans. Depend. Secure Comput. 1\u20138 (2018)"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-12786-2_3","volume-title":"Computer Security","author":"S Adepu","year":"2019","unstructured":"Adepu, S., Kandasamy, N.K., Mathur, A.: EPIC: an electric power testbed for research and training in cyber physical systems security. In: Katsikas, S.K., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Ant\u00f3n, A., Gritzalis, S., Mylopoulos, J., Kalloniatis, C. (eds.) SECPRE\/CyberICPS -2018. LNCS, vol. 11387, pp. 37\u201352. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12786-2_3"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10207-019-00452-z","volume":"19","author":"S Adepu","year":"2019","unstructured":"Adepu, S., Kandasamy, N.K., Zhou, J., Mathur, A.: Attacks on smart grid: power supply interruption and malicious power generation. Int. J. Inf. Secur. 19(2), 189\u2013211 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00452-z","journal-title":"Int. J. Inf. Secur."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Palleti, V.R., Mathur, A.P.: WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: CPS Week. CySWATER 2017, pp. 25\u201328. ACM (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"9_CR5","unstructured":"Ahmed, C.M., Zhou, J., Mathur, A.P.: Noise matters: using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in CPS. In: Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03\u201307, 2018, pp. 566\u2013581 (2018)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Biswas, P.P., Tan, H.C., Zhu, Q., Li, Y., Mashima, D., Chen, B.: A synthesized dataset for cybersecurity study of IEC 61850 based substation. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1\u20137 (2019)","DOI":"10.1109\/SmartGridComm.2019.8909783"},{"key":"9_CR7","unstructured":"Case, D.U.: Analysis of the cyber attack on the ukrainian power grid. Report (2016)"},{"key":"9_CR8","unstructured":"Green, B., Lee, A., Antrobus, R., Roedig, U., Hutchison, D., Rashid, A.: Pains, gains and plcs: Ten lessons from building an industrial control systems testbed for security research. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17). USENIX Association, Vancouver, BC, August 2017. https:\/\/www.usenix.org\/conference\/cset17\/workshop-program\/presentation\/green"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Gunathilaka, P., Mashima, D., Chen, B.: Softgrid: A software-based smart grid testbed for evaluating substation cybersecurity solutions. In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. p. 113\u2013124. CPS-SPC \u201916, Association for Computing Machinery, New York, NY, USA (2016). DOI: 10.1145\/2994487.2994494, https:\/\/doi.org\/10.1145\/2994487.2994494","DOI":"10.1145\/2994487.2994494"},{"key":"9_CR10","unstructured":"iTrust: iTrust Datasets. https:\/\/itrust.sutd.edu.sg\/itrust-labs_datasets\/"},{"key":"9_CR11","unstructured":"Kandasamy, N.K.: An investigation on feasibility and security for cyber attacks on generator synchronization process. IEEE Trans. Ind. Inf. (2019)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Mathur, A.P., Tippenhauer, N.O.: Swat: a water treatment testbed for research and training on ics security. In: CySWater, pp. 31\u201336, April 2016","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Perales Gmez, L., et al.: On the generation of anomaly detection datasets in industrial control systems. IEEE Access 7, 177460\u2013177473 (2019)","DOI":"10.1109\/ACCESS.2019.2958284"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Rajkumar, R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: Design Automation Conference, pp. 731\u2013736, June 2010","DOI":"10.1145\/1837274.1837461"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Siddiqi, A., Tippenhauer, N.O., Mashima, D., Chen, B.: On practical threat scenario testing in an electric power ICS testbed. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, pp. 15\u201321 (2018)","DOI":"10.1145\/3198458.3198461"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Sugumar, G., Mathur, A.: A method for testing distributed anomaly detectors. Int. J. Crit. Infrastr. Protect. 27, 100324 (2019). https:\/\/doi.org\/10.1016\/j.ijcip.2019.100324, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1874548219301210","DOI":"10.1016\/j.ijcip.2019.100324"},{"key":"9_CR17","doi-asserted-by":"publisher","unstructured":"Sutton, F.: An Efficient Platform and Communication Architecture for Event-triggered Cyber-physical Systems. Ph.D. thesis, ETH Zurich (2018). https:\/\/doi.org\/10.3929\/ethz-b-000260384","DOI":"10.3929\/ethz-b-000260384"},{"key":"9_CR18","unstructured":"US-CERT: Crashoverride malware. US-CERT Report (2017). https:\/\/www.us-cert.gov\/ncas\/alerts\/TA17-163A"}],"container-title":["Lecture Notes in Computer Science","Cyber-Physical Security for Critical Infrastructures Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69781-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,23]],"date-time":"2021-04-23T16:43:12Z","timestamp":1619196192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-69781-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030697808","9783030697815"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69781-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CPS4CIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cyber-Physical Security for Critical Infrastructures Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guildford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cps4cip2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/fbk.eu\/cps4cip20","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}