{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T07:16:53Z","timestamp":1775114213831,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031212796","type":"print"},{"value":"9783031212802","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_8","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"140-157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Protecting Cyber-Physical System Testbeds from Red-Teaming\/Blue-Teaming Experiments Gone Awry"],"prefix":"10.1007","author":[{"given":"Md Rakibul Hasan","family":"Talukder","sequence":"first","affiliation":[]},{"given":"Md Al","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Ashok, A., Hahn, A., Govindarasu, M.: A cyber-physical security testbed for smart grid: system architecture and studies. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, pp. 1\u20131 (2011)","DOI":"10.1145\/2179298.2179320"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","volume":"100","author":"A Banerjee","year":"2011","unstructured":"Banerjee, A., Venkatasubramanian, K.K., Mukherjee, T., Gupta, S.K.S.: Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc. IEEE 100(1), 283\u2013299 (2011)","journal-title":"Proc. IEEE"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Belyaev, K., Ray, I.: Component-oriented access control for deployment of application services in containerized environments. In: Foresti, S., Persiano, G. (eds.) CANS 2016. LNCS, vol. 10052, pp. 383\u2013399. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48965-0_23","DOI":"10.1007\/978-3-319-48965-0_23"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Burtsev, A., Radhakrishnan, P., Hibler, M., Lepreau, J.: Transparent checkpoints of closed distributed systems in emulab. In: Proceedings of the 4th ACM European Conference on Computer Systems, pp. 173\u2013186 (2009)","DOI":"10.1145\/1519065.1519084"},{"issue":"4","key":"8_CR5","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1145\/63334.63337","volume":"32","author":"N Carriero","year":"1989","unstructured":"Carriero, N., Gelernter, D.: Linda in context. Commun. ACM 32(4), 444\u2013458 (1989)","journal-title":"Commun. ACM"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Holm, H., Karresand, M., Vidstr\u00f6m, A., Westring, E.: A survey of industrial control system testbeds. In: Buchegger, S., Dam, M. (eds.) Nordic Conference on Secure IT Systems, LNSC, vol. 9417, pp. 11\u201326. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26502-5_2","DOI":"10.1007\/978-3-319-26502-5_2"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kim, S., Heo, G., Zio, E., Shin, J., Song, J.G.: Cyber attack taxonomy for digital environment in nuclear power plants. Nuclear Eng. Technol. 52(5), 995\u20131001 (2020)","DOI":"10.1016\/j.net.2019.11.001"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Line, M.B., T\u00f8ndel, I.A., Jaatun, M.G.: Cyber security challenges in smart grids. In: 2011 2nd IEEE Pes International Conference and Exhibition on Innovative Smart Grid Technologies, pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/ISGTEurope.2011.6162695"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Oyewumi, I.A., et al.: ISAAC: the idaho cps smart grid cybersecurity testbed. In: 2019 IEEE Texas Power and Energy Conference (TPEC), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/TPEC.2019.8662189"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Shi, J., Wan, J., Yan, H., Suo, H.: A survey of cyber-physical systems. In: 2011 International Conference on Wireless Communications and Signal Processing (WCSP), pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/WCSP.2011.6096958"},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/SURV.2012.0601112.00185","volume":"15","author":"C Siaterlis","year":"2012","unstructured":"Siaterlis, C., Garcia, A.P., Genge, B.: On the use of emulab testbeds for scientifically rigorous experiments. IEEE Commun. Surv. Tutorials 15(2), 929\u2013942 (2012)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"8_CR12","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/TETC.2013.2287188","volume":"1","author":"C Siaterlis","year":"2013","unstructured":"Siaterlis, C., Genge, B., Hohenadel, M.: Epic: a testbed for scientifically rigorous cyber-physical security experimentation. IEEE Trans. Emerging Top. Comput. 1(2), 319\u2013330 (2013)","journal-title":"IEEE Trans. Emerging Top. Comput."},{"issue":"9","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.3390\/electronics10091043","volume":"10","author":"AA Smadi","year":"2021","unstructured":"Smadi, A.A., Ajao, B.T., Johnson, B.K., Lei, H., Chakhchoukh, Y., Al-Haija, Q.A.: A comprehensive survey on cyber-physical smart grid testbed architectures: requirements and challenges. Electronics 10(9), 1043 (2021)","journal-title":"Electronics"},{"issue":"1","key":"8_CR14","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2011","unstructured":"Sridhar, S., Hahn, A., Govindarasu, M.: Cyber-physical system security for the electric power grid. Proc. IEEE 100(1), 210\u2013224 (2011)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:31:39Z","timestamp":1668760299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}