{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T22:24:10Z","timestamp":1773872650428,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,31]],"date-time":"2017-01-31T00:00:00Z","timestamp":1485820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP120200246"],"award-info":[{"award-number":["LP120200246"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,31]]},"DOI":"10.1145\/3014812.3014883","type":"proceedings-article","created":{"date-parts":[[2016,12,20]],"date-time":"2016-12-20T13:25:34Z","timestamp":1482240334000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Framework for SCADA cyber-attack dataset creation"],"prefix":"10.1145","author":[{"given":"Nicholas R.","family":"Rodofile","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"given":"Kenneth","family":"Radke","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"4487","volume-title":"Generation of a new IDS test dataset: Time to retire the KDD collection, in 'Proceedings of WCNC","author":"Creech G.","year":"2013"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Drias Z. Serhrouchni A. and Vogel O. {2015} Taxonomy of attacks on industrial control protocols in '2015 ICPE - NTDS'.  Drias Z. Serhrouchni A. and Vogel O. {2015} Taxonomy of attacks on industrial control protocols in '2015 ICPE - NTDS'.","DOI":"10.1109\/NOTERE.2015.7293513"},{"key":"e_1_3_2_1_3_1","first-page":"67","volume-title":"A Taxonomy of Attacks on the DNP3 Protocol, in 'Critical Infrastructure Protection III","author":"East S."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Garitano I. Siaterlis C. Genge B. Uribeetxeberria R. and Zurutuza U. {2012} A method to construct network traffic models for process control systems in 'Proceedings of ETFA 2012'.  Garitano I. Siaterlis C. Genge B. Uribeetxeberria R. and Zurutuza U. {2012} A method to construct network traffic models for process control systems in 'Proceedings of ETFA 2012'.","DOI":"10.1109\/ETFA.2012.6489550"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"key":"e_1_3_2_1_6_1","volume-title":"Using a Packet Manipulation Tool for Security Analysis of Industrial Network Protocols, in 'Proceedings of ETFA","author":"Kobayashi T.","year":"2007"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Lopes Y. Muchaluat-Saade D. C. Fernandes N. C. and Fortes M. Z. {2015} Geese: A traffic generator for performance and security evaluation of iec 61850 networks in 'Proceedings of ISIE 2015'.  Lopes Y. Muchaluat-Saade D. C. Fernandes N. C. and Fortes M. Z. {2015} Geese: A traffic generator for performance and security evaluation of iec 61850 networks in 'Proceedings of ISIE 2015'.","DOI":"10.1109\/ISIE.2015.7281552"},{"key":"e_1_3_2_1_8_1","article-title":"}, 'Detecting Integrity Attacks on SCADA Systems","author":"Mo Y.","year":"2013","journal-title":"IEEE Transactions on Control Systems Technology."},{"key":"e_1_3_2_1_9_1","volume-title":"Industrial control system traffic data sets for intrusion detection research, in 'Critical Infrastructure Protection VIII","author":"Morris T."},{"key":"e_1_3_2_1_10_1","unstructured":"Rodofile N. Radke K. and Foo E. {2015} Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy in 'Proceedings of (ACSW-AISC 2015)'.  Rodofile N. Radke K. and Foo E. {2015} Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy in 'Proceedings of (ACSW-AISC 2015)'."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843043.2843350"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sayegh N. Chehab A. Elhajj I. and Kayssi A. {2013} Internal security attacks on SCADA systems in 'Proceedings of 2013 ICCIT'.  Sayegh N. Chehab A. Elhajj I. and Kayssi A. {2013} Internal security attacks on SCADA systems in 'Proceedings of 2013 ICCIT'.","DOI":"10.1109\/ICCITechnology.2013.6579516"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Voyiatzis A. G. Katsigiannis K. and Koubias S. {2015} A modbus\/tcp fuzzer for testing internetworked industrial systems in 'ETFA'.  Voyiatzis A. G. Katsigiannis K. and Koubias S. {2015} A modbus\/tcp fuzzer for testing internetworked industrial systems in 'ETFA'.","DOI":"10.1109\/ETFA.2015.7301400"},{"key":"e_1_3_2_1_15_1","volume-title":"WIRED","author":"Zetter K.","year":"2016"},{"key":"e_1_3_2_1_16_1","article-title":"}, 'Next-generation monitoring, analysis, and control for the future smart control center', Smart Grid","author":"Zhang P.","year":"2010","journal-title":"IEEE Transactions on."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.34"}],"event":{"name":"ACSW 2017: Australasian Computer Science Week 2017","location":"Geelong Australia","acronym":"ACSW 2017"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3014812.3014883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:18Z","timestamp":1750220658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,31]]},"references-count":17,"alternative-id":["10.1145\/3014812.3014883","10.1145\/3014812"],"URL":"https:\/\/doi.org\/10.1145\/3014812.3014883","relation":{},"subject":[],"published":{"date-parts":[[2017,1,31]]},"assertion":[{"value":"2017-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}