{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:44:07Z","timestamp":1771955047983,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031171420","type":"print"},{"value":"9783031171437","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17143-7_24","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:04:22Z","timestamp":1663905862000},"page":"493-513","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Perspectives from\u00a0a\u00a0Comprehensive Evaluation of\u00a0Reconstruction-based Anomaly Detection in\u00a0Industrial Control Systems"],"prefix":"10.1007","author":[{"given":"Clement","family":"Fung","sequence":"first","affiliation":[]},{"given":"Shreya","family":"Srinarasi","sequence":"additional","affiliation":[]},{"given":"Keane","family":"Lucas","sequence":"additional","affiliation":[]},{"given":"Hay Bryan","family":"Phee","sequence":"additional","affiliation":[]},{"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Abdelaty, M., Doriguzzi-Corin, R., Siracusa, D.: DAICS: a deep learning solution for anomaly detection in industrial control systems. arXiv:2009.06299 (2020)","DOI":"10.1109\/TETC.2021.3073017"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Abokifa, A.A., Haddad, K., Lo, C.S., Biswas, P.: Detection of cyber physical attacks on water distribution systems via principal component analysis and artificial neural networks. In: World Environmental and Water Resources Congress (2017)","DOI":"10.1061\/9780784480625.063"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-12786-2_3","volume-title":"Computer Security","author":"S Adepu","year":"2019","unstructured":"Adepu, S., Kandasamy, N.K., Mathur, A.: EPIC: an electric power testbed for research and training in cyber physical systems security. In: Katsikas, S.K., et al. (eds.) SECPRE\/CyberICPS -2018. LNCS, vol. 11387, pp. 37\u201352. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12786-2_3"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Palleti, V.R., Mathur, A.P.: WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"24_CR5","first-page":"2493","volume":"12","author":"R Collobert","year":"2011","unstructured":"Collobert, R., Weston, J., Bottou, L., Karlen, M., Kavukcuoglu, K., Kuksa, P.: Natural language processing (Almost) from scratch. J. Mach. Learn. Res. 12, 2493\u20132537 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"24_CR6","unstructured":"Di Pinto, A., Dragoni, Y., Carcano, A.: TRITON: the first ICS cyber attack on safety instrument systems. In: Black Hat USA (2018)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Erba, A., et al.: Constrained concealment attacks against reconstruction-based anomaly detectors in industrial control systems. In: Annual Computer Security Applications Conference (2020)","DOI":"10.1145\/3427228.3427660"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Feng, C., Palleti, V.R., Mathur, A., Chana, D.: A systematic framework to generate invariants for anomaly detection in industrial control systems. In: Network and Distributed System Security Symposium (2019)","DOI":"10.14722\/ndss.2019.23265"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber physical systems using recurrent neural networks. In: 18th International Symposium on High Assurance Systems Engineering (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-71368-7_8","volume-title":"Critical Information Infrastructures Security","author":"J Goh","year":"2017","unstructured":"Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 88\u201399. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"155504","DOI":"10.1109\/ACCESS.2019.2948793","volume":"7","author":"D Hasselquist","year":"2019","unstructured":"Hasselquist, D., Rawat, A., Gurtov, A.: Trends and detection avoidance of internet-connected industrial control systems. IEEE Access 7, 155504\u2013155512 (2019)","journal-title":"IEEE Access"},{"issue":"5786","key":"24_CR12","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006)","journal-title":"Science"},{"issue":"8","key":"24_CR13","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Hwang, W.S., Yun, J.H., Kim, J., Kim, H.C.: Time-series aware precision and recall for anomaly detection: considering variety of detection result and addressing ambiguous labeling. In: 28th ACM International Conference on Information and Knowledge Management (2019)","DOI":"10.1145\/3357384.3358118"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Inoue, J., Yamagata, Y., Chen, Y., Poskitt, C.M., Sun, J.: Anomaly detection for a water treatment system using unsupervised machine learning. In: IEEE International Conference on Data Mining Workshops (2017)","DOI":"10.1109\/ICDMW.2017.149"},{"issue":"1","key":"24_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/0278-6125(86)90064-6","volume":"5","author":"AT Jones","year":"1986","unstructured":"Jones, A.T., McLean, C.R.: A proposed hierarchical control model for automated manufacturing systems. J. Manufact. Syst. 5(1), 15\u201325 (1986)","journal-title":"J. Manufact. Syst."},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-42048-2_1","volume-title":"Computer Security","author":"J Kim","year":"2020","unstructured":"Kim, J., Yun, J.-H., Kim, H.C.: Anomaly detection for industrial control systems using sequence-to-sequence neural networks. In: Katsikas, S., et al. (eds.) CyberICPS\/SECPRE\/SPOSE\/ADIoT -2019. LNCS, vol. 11980, pp. 3\u201318. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42048-2_1"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Kravchik, M., Shabtai, A.: Detecting cyber attacks in industrial control systems using convolutional neural networks. In: Workshop on Cyber-Physical Systems Security and Privacy (2018)","DOI":"10.1145\/3264888.3264896"},{"key":"24_CR19","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TDSC.2021.3050101","volume":"19","author":"M Kravchik","year":"2021","unstructured":"Kravchik, M., Shabtai, A.: Efficient cyber attack detection in industrial control systems using lightweight neural networks and PCA. IEEE Trans. Dependable Secure Comput. 19, 2179\u20132197 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"12","key":"24_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MC.2017.4451203","volume":"50","author":"N Kshetri","year":"2017","unstructured":"Kshetri, N., Voas, J.: Hacking power grids: a current problem. Computer 50(12), 91\u201395 (2017)","journal-title":"Computer"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Lavin, A., Ahmad, S.: Evaluating real-time anomaly detection algorithms-the Numenta anomaly benchmark. In: 14th International Conference on Machine Learning and Applications (2015)","DOI":"10.1109\/ICMLA.2015.141"},{"key":"24_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/978-3-030-30490-4_56","volume-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2019: Text and Time Series","author":"D Li","year":"2019","unstructured":"Li, D., Chen, D., Jin, B., Shi, L., Goh, J., Ng, S.-K.: MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: Tetko, I.V., K\u016frkov\u00e1, V., Karpov, P., Theis, F. (eds.) ICANN 2019. LNCS, vol. 11730, pp. 703\u2013716. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30490-4_56"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Lin, Q., Adepu, S., Verwer, S., Mathur, A.: TABOR: a graphical model-based approach for anomaly detection in industrial control systems. In: Asia Conference on Computer and Communications Security (2018)","DOI":"10.1145\/3196494.3196546"},{"key":"24_CR24","unstructured":"Morris, T.H., Thornton, Z., Turnipseed, I.: Industrial control system simulation and data logging for intrusion detection system research. In: 7th Annual Southeastern Cyber Security Summit (2015)"},{"issue":"2","key":"24_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"10","key":"24_CR26","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.3390\/sym12101583","volume":"12","author":"\u00c1L Perales G\u00f3mez","year":"2020","unstructured":"Perales G\u00f3mez, \u00c1.L., Fern\u00e1ndez Maim\u00f3, L., Huertas Celdr\u00e1n, A., Garc\u00eda Clemente, F.J.: MADICS: a methodology for anomaly detection in industrial control systems. Symmetry 12(10), 1583 (2020)","journal-title":"Symmetry"},{"key":"24_CR27","unstructured":"Shalyga, D., Filonov, P., Lavrentyev, A.: Anomaly detection for water treatment system based on neural network with automatic architecture optimization. arXiv:1807.07282 (2018)"},{"key":"24_CR28","unstructured":"Shin, H.K., Lee, W., Yun, J.H., Kim, H.: HAI 1.0: HIL-based augmented ICS security dataset. In: 13th USENIX Workshop on Cyber Security Experimentation and Test (2020)"},{"key":"24_CR29","doi-asserted-by":"crossref","unstructured":"Singh, N., Olinsky, C.: Demystifying Numenta anomaly benchmark. In: International Joint Conference on Neural Networks (2017)","DOI":"10.1109\/IJCNN.2017.7966038"},{"issue":"4","key":"24_CR30","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 45(4), 427\u2013437 (2009)","journal-title":"Inf. Process. Manag."},{"key":"24_CR31","unstructured":"Stouffer, K.: Guide to industrial control systems (ICS) security. NIST Special Publication 800(82) (2011)"},{"issue":"10","key":"24_CR32","doi-asserted-by":"publisher","first-page":"04018065","DOI":"10.1061\/(ASCE)WR.1943-5452.0000983","volume":"144","author":"R Taormina","year":"2018","unstructured":"Taormina, R., Galelli, S.: Deep-learning approach to the detection and localization of cyber-physical attacks on water distribution systems. J. Water Res. Planning Manag. 144(10), 04018065 (2018)","journal-title":"J. Water Res. Planning Manag."},{"issue":"8","key":"24_CR33","doi-asserted-by":"publisher","first-page":"04018048","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969","volume":"144","author":"R Taormina","year":"2018","unstructured":"Taormina, R., et al.: Battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J. Water Res. Planning Manag. 144(8), 04018048 (2018)","journal-title":"J. Water Res. Planning Manag."},{"key":"24_CR34","unstructured":"Tatbul, N., Lee, T.J., Zdonik, S., Alam, M., Gottschlich, J.: Precision and recall for time series. In: Advances in Neural Information Processing Systems (2018)"},{"key":"24_CR35","doi-asserted-by":"crossref","unstructured":"Turrin, F., Erba, A., Tippenhauer, N.O., Conti, M.: A statistical analysis framework for ICS process datasets. In: Joint Workshop on CPS and IoT Security and Privacy (2020)","DOI":"10.1145\/3411498.3419961"},{"issue":"6","key":"24_CR36","doi-asserted-by":"publisher","first-page":"2338","DOI":"10.1109\/TCYB.2019.2915124","volume":"50","author":"D Ye","year":"2020","unstructured":"Ye, D., Zhang, T.Y.: Summation detector for false data-injection attack in cyber-physical systems. IEEE Trans. Cybernetics 50(6), 2338\u20132345 (2020)","journal-title":"IEEE Trans. Cybernetics"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Zizzo, G., Hankin, C., Maffeis, S., Jones, K.: Intrusion detection for industrial control systems: evaluation analysis and adversarial attacks. arXiv:1911.04278 (2019)","DOI":"10.1109\/TrustCom50675.2020.00121"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17143-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:10:01Z","timestamp":1663906201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17143-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171420","9783031171437"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17143-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}