{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:22:52Z","timestamp":1763457772626,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/ssic.2018.8556706","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:08:55Z","timestamp":1544126935000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Assessing Industrial Control System Attack Datasets for Intrusion Detection"],"prefix":"10.1109","author":[{"given":"Xuelei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Industrial control systems security testbed","author":"korkmaz","year":"2016","journal-title":"11th Annual Symposium on Information Assurance"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-642-34210-3_4","article-title":"Cyber security exercises and competitions as a platform for cyber security experiments","author":"sommestad","year":"2012","journal-title":"Secure IT Systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2017.8247855"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.jnca.2017.03.018","article-title":"Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling","volume":"87","author":"haider","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-319-32125-7_10","article-title":"Situational awareness in industrial control systems","author":"hoffman","year":"2016","journal-title":"Cyber-security of SCADA & Industrial Control Systems"},{"key":"ref16","first-page":"179","article-title":"Review of real-time simulator and the steps involved for implementation of a model from MATLAB\/SIMULINK to real-time","volume":"96","author":"mikkili","year":"2015","journal-title":"Electrical Engineers Journal of the Institution of"},{"key":"ref17","first-page":"37","article-title":"The what, where, and why of real-time simulation","author":"b\u00e9langer","year":"2010","journal-title":"IEEE PES General Meeting"},{"journal-title":"W32 stuxnet Dossier","year":"0","author":"falliere","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.01.004"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.002"},{"key":"ref4","first-page":"1092","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref27","first-page":"3","article-title":"Supervised machine learning: a review of classification techniques","author":"kotsiantis","year":"2007","journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering"},{"key":"ref3","first-page":"53","article-title":"Threat analysis of BlackEnergy malware for synchrophasor based real-time control and monitoring in smart grid","author":"khan","year":"2016","journal-title":"International Symposium for ICS & SCADA Cyber Security Research 2016"},{"key":"ref6","first-page":"25","article-title":"A comparative study of anomaly detection schemes in network intrusion detection","author":"lazarevic","year":"2018","journal-title":"Proceedings of the 2003 SIAM International Conference on Data Mining"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3104","DOI":"10.1109\/TSG.2015.2409775","article-title":"Developing a hybrid intrusion detection system using data mining for power systems","volume":"6","author":"pan","year":"2015","journal-title":"IEEE Transactions on Smart Grid"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2014.6779523"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BEIAC.2013.6560100"},{"key":"ref1","first-page":"161","article-title":"Cyber-physical systems","author":"baheti","year":"2011","journal-title":"The Impact of Control Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746268"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2001.996391"},{"key":"ref21","first-page":"58","article-title":"Exploitation of Allen Bradley&#x2019;s implementation of EtherNet\/IP for denial of service against industrial control systems","author":"grandgenett","year":"2014","journal-title":"9th International Conference on Cyber Warfare and Security ICCWS-2014"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-319-65127-9_6","article-title":"Detection and mitigation of time delay injection attacks on industrial control systems with PLCs","author":"korkmaz","year":"2017","journal-title":"Computer Network Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014883"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.ijcip.2013.04.004","article-title":"Firmware modification attacks on programmable logic controllers","volume":"6","author":"basnight","year":"2013","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"}],"event":{"name":"2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)","start":{"date-parts":[[2018,10,18]]},"location":"Shanghai, China","end":{"date-parts":[[2018,10,19]]}},"container-title":["2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537784\/8556633\/08556706.pdf?arnumber=8556706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T21:35:25Z","timestamp":1643232925000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8556706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ssic.2018.8556706","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}