{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:16:03Z","timestamp":1770279363980,"version":"3.49.0"},"publisher-location":"Cham","reference-count":83,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031171420","type":"print"},{"value":"9783031171437","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17143-7_28","type":"book-chapter","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:04:22Z","timestamp":1663905862000},"page":"574-594","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Can Industrial Intrusion Detection Be SIMPLE?"],"prefix":"10.1007","author":[{"given":"Konrad","family":"Wolsing","sequence":"first","affiliation":[]},{"given":"Lea","family":"Thiemt","sequence":"additional","affiliation":[]},{"given":"Christian van","family":"Sloun","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Abdelaty, M.F., et al.: DAICS: a deep learning solution for anomaly detection in industrial control systems. IEEE Trans. Emerg. Topics Comput. (2021)","DOI":"10.1109\/TETC.2021.3073017"},{"key":"28_CR2","unstructured":"Ahmed, C., et al.: NoisePrint: attack detection using sensor and process noise fingerprint in cyber physical systems. In: ACM ASIACCS (2018)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed, C., et al.: WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: CySWATER (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Ahmed, C., et al.: Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in CPS. In: ACSAC (2018)","DOI":"10.1145\/3274694.3274748"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Alabugin, S.K., et al.: Applying of generative adversarial networks for anomaly detection in industrial control systems. In: GloSIC (2020)","DOI":"10.1109\/GloSIC50886.2020.9267878"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Alabugin, S.K., et al.: Applying of recurrent neural networks for industrial processes anomaly detection. In: IEEE USBEREIT (2021)","DOI":"10.1109\/USBEREIT51232.2021.9455060"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Alladi, T., et al.: Industrial control systems: cyberattack trends and countermeasures. Computer Communications 155 (2020)","DOI":"10.1016\/j.comcom.2020.03.007"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Anton, S.D.D., et al.: Using temporal and topological features for intrusion detection in operational networks. In: ARES (2019)","DOI":"10.1145\/3339252.3341476"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Anton, S.D.D., et al.: Security in process: detecting attacks in industrial process data. In: CECC (2019)","DOI":"10.1145\/3360664.3360669"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Anton, S.D.D., et al.: Intrusion detection in binary process data: introducing the hamming-distance to matrix profiles. In: IEEE WoWMoM (2020)","DOI":"10.1109\/WoWMoM49955.2020.00065"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Aoudi, W., et al.: Truth will out: departure-based process-level detection of stealthy attacks on control systems. In: ACM CCS (2018)","DOI":"10.1145\/3243734.3243781"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Audibert, J., et al.: USAD: unsupervised anomaly detection on multivariate time series. In: ACM SIGKDD (2020)","DOI":"10.1145\/3394486.3403392"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Bae, S., et al.: Research on improvement of anomaly detection performance in industrial control systems. In: WISA (2021)","DOI":"10.1007\/978-3-030-89432-0_7"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Cao, D., et al.: Self-Adaption AAE-GAN for aluminum electrolytic cell anomaly detection. IEEE Access 9 (2021)","DOI":"10.1109\/ACCESS.2021.3097116"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Castellanos, J.H., et al.: A modular hybrid learning approach for black-box security testing of CPS. In: ACNS (2019)","DOI":"10.1007\/978-3-030-21568-2_10"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Chen, X., et al.: DAEMON: unsupervised anomaly detection and interpretation for multivariate time series. In: IEEE ICDE (2021)","DOI":"10.1109\/ICDE51399.2021.00228"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Chen, Z., et al.: Learning graph structures with transformer for multivariate time series anomaly detection in IoT. IEEE IoT-J (2021)","DOI":"10.1109\/JIOT.2021.3100509"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Clotet, X., et al.: A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of critical infrastructures. IJCIP 23, 11\u201320 (2018)","DOI":"10.1016\/j.ijcip.2018.08.002"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Conti, M., et al.: A survey on industrial control system testbeds and datasets for security research. IEEE Commun. Surv. Tutor. 23(4), 2248\u20132294 (2021)","DOI":"10.1109\/COMST.2021.3094360"},{"key":"28_CR20","unstructured":"Dai, E., et al.: Graph-augmented normalizing flows for anomaly detection of multiple time series. In: ICLR (2022)"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Demertzis, K., et al.: Variational restricted boltzmann machines to automated anomaly detection. Neural Comput. Appl., 1\u201314 (2022)","DOI":"10.1007\/s00521-022-07060-4"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Deng, A., et al.: Graph neural network-based anomaly detection in multivariate time series. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Ding, D., et al.: A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 275, 1674\u20131683 (2018)","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Dutta, A.K., et al.: CatchAll: A Robust Multivariate Intrusion Detection System for Cyber-Physical Systems Using Low Rank Matrix. In: CPSIoTSec (2021)","DOI":"10.1145\/3462633.3483978"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Elnour, M., et al.: A dual-isolation-forests-based attack detection framework for industrial control systems. IEEE Access 8, 36639\u201336651 (2020)","DOI":"10.1109\/ACCESS.2020.2975066"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Elnour, M., et al.: Hybrid attack detection framework for industrial control systems using 1d-convolutional neural network and isolation forest. In: CCTA (2020)","DOI":"10.1109\/CCTA41146.2020.9206394"},{"key":"28_CR27","unstructured":"Erba, A., et al.: No Need to Know Physics: Resilience of Process-Based Model-Free Anomaly Detection for Industrial Control Systems. arXiv:2012.03586 (2020)"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Etalle, S.: From intrusion detection to software design. In: ESORICS (2017)","DOI":"10.1007\/978-3-319-66402-6_1"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Faber, K., et al.: Ensemble neuroevolution-based approach for multivariate time series anomaly detection. Entropy 23(11), 1466 (2021)","DOI":"10.3390\/e23111466"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"F\u00e4hrmann, D., et al.: Lightweight long short-term memory variational auto-encoder for multivariate time series anomaly detection in industrial control systems. Sensors 22(8), 2886 (2022)","DOI":"10.3390\/s22082886"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Faramondi, L., et al.: A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing. IEEE Access 9, 122385\u2013122396 (2021)","DOI":"10.1109\/ACCESS.2021.3109465"},{"key":"28_CR32","doi-asserted-by":"crossref","unstructured":"Farsi, H., et al.: A novel online state-based anomaly detection system for process control networks. IJCIP 27, 100323 (2019)","DOI":"10.1016\/j.ijcip.2019.100323"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Feng, C., et al.: A systematic framework to generate invariants for anomaly detection in industrial control systems. In: NDSS (2019)","DOI":"10.14722\/ndss.2019.23265"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Feng, C., et al.: Time series anomaly detection for cyber-physical systems via neural system identification and bayesian filtering. In: ACM SIGKDD (2021)","DOI":"10.1145\/3447548.3467137"},{"key":"28_CR35","doi-asserted-by":"crossref","unstructured":"Francisquini, R., et al.: Community-based anomaly detection using spectral graph filtering. Appl. Soft Comput. 118, 108489 (2022)","DOI":"10.1016\/j.asoc.2022.108489"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Gauthama Raman, M., et al.: Deep autoencoders as anomaly detectors: method and case study in a distributed water treatment plant. Comput. Secur. 99, 102055 (2020)","DOI":"10.1016\/j.cose.2020.102055"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Giraldo, J., et al.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 51(4), 1\u201336 (2018)","DOI":"10.1145\/3203245"},{"key":"28_CR38","doi-asserted-by":"crossref","unstructured":"Goh, J., et al.: A dataset to support research in the design of secure water treatment systems. In: CRITIS (2016)","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Goh, J., et al.: Anomaly detection in cyber physical systems using recurrent neural networks. In: IEEE HASE (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"28_CR40","doi-asserted-by":"crossref","unstructured":"Gong, S., et al.: A prediction-augmented AutoEncoder for multivariate time series anomaly detection. In: ICONIP (2021)","DOI":"10.1007\/978-3-030-92185-9_56"},{"key":"28_CR41","doi-asserted-by":"crossref","unstructured":"Guo, Y., et al.: Unsupervised anomaly detection in IoT systems for smart cities. IEEE TNSE 7(4), 2231\u20132242 (2020)","DOI":"10.1109\/TNSE.2020.3027543"},{"key":"28_CR42","doi-asserted-by":"crossref","unstructured":"Hwang, C., et al.: E-SFD: explainable sensor fault detection in the ICS anomaly detection system. IEEE Access 9, 140470\u2013140486 (2021)","DOI":"10.1109\/ACCESS.2021.3119573"},{"key":"28_CR43","doi-asserted-by":"crossref","unstructured":"Inoue, J., et al.: Anomaly detection for a water treatment system using unsupervised machine learning. In: DMCIS (2017)","DOI":"10.1109\/ICDMW.2017.149"},{"key":"28_CR44","unstructured":"Intrator, Y., et al.: MDGAN: boosting anomaly detection using multi-discriminator generative adversarial networks. arXiv:1810.05221 (2018)"},{"key":"28_CR45","doi-asserted-by":"crossref","unstructured":"Kim, D., et al.: Stacked-autoencoder based anomaly detection with industrial control system. In: SNPD (2021)","DOI":"10.1007\/978-3-030-67008-5_15"},{"key":"28_CR46","doi-asserted-by":"crossref","unstructured":"Kim, J., et al.: Anomaly detection for industrial control systems using sequence-to-sequence neural networks. In: CyberICPS (2020)","DOI":"10.1007\/978-3-030-42048-2_1"},{"key":"28_CR47","doi-asserted-by":"crossref","unstructured":"Kim, S., et al.: APAD: autoencoder-based payload anomaly detection for industrial IoE. Appl. Soft Comput. 88, 106017 (2020)","DOI":"10.1016\/j.asoc.2019.106017"},{"key":"28_CR48","doi-asserted-by":"crossref","unstructured":"Kim, Y., et al.: Anomaly detection using clustered deep one-class classification. In: AsiaJCIS (2020)","DOI":"10.1109\/AsiaJCIS50894.2020.00034"},{"key":"28_CR49","doi-asserted-by":"crossref","unstructured":"Kravchik, M., et al.: Detecting cyber attacks in industrial control systems using convolutional neural networks. In: CPS-SPC (2018)","DOI":"10.1145\/3264888.3264896"},{"key":"28_CR50","doi-asserted-by":"crossref","unstructured":"Kravchik, M., et al.: Efficient cyber attack detection in industrial control systems using lightweight neural networks and PCA. IEEE TDSC (2021)","DOI":"10.1109\/TDSC.2021.3050101"},{"key":"28_CR51","doi-asserted-by":"crossref","unstructured":"Kus, D., et al.: A False Sense of Security? ACM CPSS, revisiting the state of machine learning-based industrial intrusion detection. In (2022)","DOI":"10.1145\/3494107.3522773"},{"key":"28_CR52","doi-asserted-by":"crossref","unstructured":"Kwon, H.Y., et al.: Advanced intrusion detection combining signature-based and behavior-based detection methods. Electronics 11(6), 867 (2022)","DOI":"10.3390\/electronics11060867"},{"key":"28_CR53","doi-asserted-by":"crossref","unstructured":"Lavrova, D., et al.: Using GRU neural network for cyber-attack detection in automated process control systems. In: IEEE BlackSeaCom (2019)","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"28_CR54","doi-asserted-by":"crossref","unstructured":"Lee, C.K., et al.: Studies on the GAN-based anomaly detection methods for the time series data. IEEE Access 9, 73201\u201373215 (2021)","DOI":"10.1109\/ACCESS.2021.3078553"},{"key":"28_CR55","unstructured":"Li, D., et al.: Anomaly detection with generative adversarial networks for multivariate time series. In: KDD BigMine (2018)"},{"key":"28_CR56","doi-asserted-by":"crossref","unstructured":"Li, D., et al.: MAD-GAN: multivariate anomaly detection for time series data with generative adversarial networks. In: ICANN (2019)","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"28_CR57","doi-asserted-by":"crossref","unstructured":"Lin, Q., et al.: TABOR: a graphical model-based approach for anomaly detection in industrial control systems. In: ACM ASIACCS (2018)","DOI":"10.1145\/3196494.3196546"},{"key":"28_CR58","doi-asserted-by":"crossref","unstructured":"Macas, M., et al.: An unsupervised framework for anomaly detection in a water treatment system. In: IEEE ICMLA (2019)","DOI":"10.1109\/ICMLA.2019.00212"},{"key":"28_CR59","unstructured":"Margolin, J.: Outdated Computer System Exploited in Water Treatment Plant Hack (2021), www.abc7news.com\/story\/10328196\/, accessed: 2022\u201304-24"},{"key":"28_CR60","doi-asserted-by":"crossref","unstructured":"Maru, C., et al.: Collective anomaly detection for multivariate data using generative adversarial networks. In: CSCI (2020)","DOI":"10.1109\/CSCI51800.2020.00106"},{"key":"28_CR61","doi-asserted-by":"crossref","unstructured":"Mokhtari, S., et al.: Measurement data intrusion detection in industrial control systems based on unsupervised learning. AIMS-ACI 1(1) (2021)","DOI":"10.3934\/aci.2021004"},{"key":"28_CR62","doi-asserted-by":"crossref","unstructured":"Naito, S., et al.: Anomaly Detection for Multivariate Time Series on Large-Scale Fluid Handling Plant Using Two-Stage Autoencoder. In: ICDMW (2021)","DOI":"10.1109\/ICDMW53433.2021.00072"},{"key":"28_CR63","doi-asserted-by":"crossref","unstructured":"Nedeljkovic, D.M., et al.: Detection of cyber-attacks in systems with distributed control based on support vector regression. TELFOR J. 12(2), 104\u2013109 (2020)","DOI":"10.5937\/telfor2002104N"},{"key":"28_CR64","doi-asserted-by":"crossref","unstructured":"Neshenko, N., et al.: A behavioral-based forensic investigation approach for analyzing attacks on water plants using GANs. FSI Digital Investigation 37 (2021)","DOI":"10.1016\/j.fsidi.2021.301198"},{"key":"28_CR65","doi-asserted-by":"crossref","unstructured":"Oliveira, N., et al.: Anomaly detection in cyber-physical systems: reconstruction of a prediction error feature space. In: SINCONF (2021)","DOI":"10.1109\/SIN54109.2021.9699339"},{"key":"28_CR66","doi-asserted-by":"crossref","unstructured":"Perales Gomez, A.L., et al.: MADICS: a methodology for anomaly detection in industrial control systems. Symmetry 12(10), 1583 (2020)","DOI":"10.3390\/sym12101583"},{"key":"28_CR67","unstructured":"Pranavan, T., et al.: Contrastive predictive coding for anomaly detection in multi-variate time series data. arXiv:2202.03639 (2022)"},{"key":"28_CR68","doi-asserted-by":"crossref","unstructured":"Pyatnisky, I., et al.: Assessment of the applicability of autoencoders in the problem of detecting anomalies in the work of industrial control Systems. In: GloSIC (2020)","DOI":"10.1109\/GloSIC50886.2020.9267864"},{"key":"28_CR69","unstructured":"Ray, S., et al.: Learning graph neural networks for multivariate time series anomaly detection. arXiv:2111.08082 (2021)"},{"key":"28_CR70","unstructured":"Schneider, T., et al.: Detecting anomalies within time series using local neural transformations. arXiv:2202.03944 (2022)"},{"key":"28_CR71","unstructured":"Shalyga, D., et al.: Anomaly detection for water treatment system based on neural network with automatic architecture optimization. arXiv:1807.07282 (2018)"},{"key":"28_CR72","unstructured":"Shin, H., et al.: HAI 1.0: HIL-based Augmented ICS Security Dataset. CSET (2020)"},{"key":"28_CR73","doi-asserted-by":"crossref","unstructured":"Tuli, S., et al.: TranAD: deep transformer networks for anomaly detection in multivariate time series data. In: VLDB (2022)","DOI":"10.14778\/3514061.3514067"},{"key":"28_CR74","doi-asserted-by":"crossref","unstructured":"Umer, M.A., et al.: Generating invariants using design and data-centric approaches for distributed attack detection. IJCIP 28, 100341 (2020)","DOI":"10.1016\/j.ijcip.2020.100341"},{"key":"28_CR75","doi-asserted-by":"crossref","unstructured":"Wang, C., et al.: Anomaly detection for industrial control system based on autoencoder neural network. In: WCMC 2020 (2020)","DOI":"10.1155\/2020\/8897926"},{"key":"28_CR76","doi-asserted-by":"crossref","unstructured":"Wolsing, K., et al.: IPAL: breaking up silos of protocol-dependent and domain-specific industrial intrusion detection systems. In: Proceedings of RAID (2022)","DOI":"10.1145\/3545948.3545968"},{"key":"28_CR77","unstructured":"Xiao, Q., et al.: Memory-augmented adversarial autoencoders for multivariate time-series anomaly detection with deep reconstruction and prediction. arXiv:2110.08306 (2021)"},{"key":"28_CR78","doi-asserted-by":"crossref","unstructured":"Xie, X., et al.: Multivariate abnormal detection for industrial control systems using 1D CNN and GRU. IEEE Access 8, 88348\u201388359 (2020)","DOI":"10.1109\/ACCESS.2020.2993335"},{"key":"28_CR79","doi-asserted-by":"crossref","unstructured":"Xu, Q., et al.: Digital twin-based anomaly detection in cyber-physical systems. In: IEEE ICST (2021)","DOI":"10.1109\/ICST49551.2021.00031"},{"key":"28_CR80","doi-asserted-by":"crossref","unstructured":"Yan, T., et al.: TFDPM: attack detection for cyber-physical systems with diffusion probabilistic models. arXiv:2112.10774 (2021)","DOI":"10.1016\/j.knosys.2022.109743"},{"key":"28_CR81","unstructured":"Yang, L., et al.: Iterative bilinear temporal-spectral fusion for unsupervised representation learning in time series. arXiv:2202.04770 (2022)"},{"key":"28_CR82","doi-asserted-by":"crossref","unstructured":"Yoong, C.H., et al.: Deriving invariant checkers for critical infrastructure using axiomatic design principles. Cybersecurity 4, 1\u201324 (2021)","DOI":"10.1186\/s42400-021-00069-7"},{"key":"28_CR83","doi-asserted-by":"crossref","unstructured":"Zhang, K., et al.: Federated variational learning for anomaly detection in multivariate time series. In: IEEE IPCCC (2021)","DOI":"10.1109\/IPCCC51483.2021.9679367"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17143-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:44:09Z","timestamp":1676868249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17143-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031171420","9783031171437"],"references-count":83,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17143-7_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"562","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"104","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}