{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:01:27Z","timestamp":1772906487220,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation (NRF), Prime Ministers Office, Singapore, under its National Cybersecurity R&D Programme","award":["NRF2014NCR-NCR001-40"],"award-info":[{"award-number":["NRF2014NCR-NCR001-40"]}]},{"name":"NWO Project","award":["62001628 (LEMMA)"],"award-info":[{"award-number":["62001628 (LEMMA)"]}]},{"name":"Technologiestichting STW VENI Project","award":["13136 (MANTA)"],"award-info":[{"award-number":["13136 (MANTA)"]}]},{"name":"SUTD and TU Delft 2+2 PhD program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196546","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"525-536","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":126,"title":["TABOR"],"prefix":"10.1145","author":[{"given":"Qin","family":"Lin","sequence":"first","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Sridha","family":"Adepu","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Sicco","family":"Verwer","sequence":"additional","affiliation":[{"name":"Delft University of Technology, Delft, Netherlands"}]},{"given":"Aditya","family":"Mathur","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Generalized Attacker and Attack Models for Cyber Physical Systems 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). 283--292","author":"Adepu S.","unstructured":"S. Adepu and A. Mathur . 2016 a . Generalized Attacker and Attack Models for Cyber Physical Systems 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). 283--292 . S. Adepu and A. Mathur. 2016 a. Generalized Attacker and Attack Models for Cyber Physical Systems 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). 283--292."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.14"},{"key":"e_1_3_2_1_3_1","volume-title":"2016 c. Using process invariants to detect cyber attacks on a water treatment system IFIP International Information Security and Privacy Conference","author":"Adepu Sridhar","unstructured":"Sridhar Adepu and Aditya Mathur . 2016 c. Using process invariants to detect cyber attacks on a water treatment system IFIP International Information Security and Privacy Conference . Springer , 91--104. Sridhar Adepu and Aditya Mathur. 2016 c. Using process invariants to detect cyber attacks on a water treatment system IFIP International Information Security and Privacy Conference. Springer, 91--104."},{"key":"e_1_3_2_1_4_1","volume-title":"Access Control in Water Distribution Networks: A Case Study 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS). 184--191","author":"Adepu S.","unstructured":"S. Adepu , G. Mishra , and A. Mathur . 2017 . Access Control in Water Distribution Networks: A Case Study 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS). 184--191 . S. Adepu, G. Mishra, and A. Mathur. 2017. Access Control in Water Distribution Networks: A Case Study 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS). 184--191."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31982-5_14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050917.2050919"},{"key":"e_1_3_2_1_10_1","unstructured":"Pamel Cobb. 2015. German Steel Mill Meltdown: Rising Stakes in the Internet of Things. (2015). deftempurl%https:\/\/securityintelligence.com\/german-steel-mill-meltdown-rising-stakes-in-the-internet-of-things\/  Pamel Cobb. 2015. German Steel Mill Meltdown: Rising Stakes in the Internet of Things. (2015). deftempurl%https:\/\/securityintelligence.com\/german-steel-mill-meltdown-rising-stakes-in-the-internet-of-things\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022649401552"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991126"},{"key":"e_1_3_2_1_13_1","first-page":"37","article-title":"On cyber attacks and signature based intrusion detection for modbus based industrial control systems","volume":"9","author":"Gao Wei","year":"2014","unstructured":"Wei Gao and Thomas H Morris . 2014 . On cyber attacks and signature based intrusion detection for modbus based industrial control systems . The Journal of Digital Forensics, Security and Law: JDFSL Vol. 9 , 1 (2014), 37 . Wei Gao and Thomas H Morris. 2014. On cyber attacks and signature based intrusion detection for modbus based industrial control systems. The Journal of Digital Forensics, Security and Law: JDFSL Vol. 9, 1 (2014), 37.","journal-title":"The Journal of Digital Forensics, Security and Law: JDFSL"},{"key":"e_1_3_2_1_14_1","volume-title":"2017 IEEE 18th International Symposium on. IEEE, 140--145","author":"Goh Jonathan","year":"2017","unstructured":"Jonathan Goh , Sridhar Adepu , Marcus Tan , and Zi Shan Lee . 2017 . Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks High Assurance Systems Engineering (HASE) , 2017 IEEE 18th International Symposium on. IEEE, 140--145 . Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks High Assurance Systems Engineering (HASE), 2017 IEEE 18th International Symposium on. IEEE, 140--145."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"e_1_3_2_1_16_1","volume-title":"Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning. arXiv preprint arXiv:1709.05342","author":"Inoue Jun","year":"2017","unstructured":"Jun Inoue , Yoriyuki Yamagata , Yuqi Chen , Christopher M Poskitt , and Jun Sun . 2017. Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning. arXiv preprint arXiv:1709.05342 ( 2017 ). Jun Inoue, Yoriyuki Yamagata, Yuqi Chen, Christopher M Poskitt, and Jun Sun. 2017. Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning. arXiv preprint arXiv:1709.05342 (2017)."},{"key":"e_1_3_2_1_17_1","unstructured":"Goh J. Adepu S. Junejo K. N and Mathur A.. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems The 11th International Conference on Critical Information Infrastructures Security (CRITIS). Springer New York USA 1--13.  Goh J. Adepu S. Junejo K. N and Mathur A.. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems The 11th International Conference on Critical Information Infrastructures Security (CRITIS). Springer New York USA 1--13."},{"key":"e_1_3_2_1_18_1","volume-title":"2014 IEEE 53rd Annual Conference on. IEEE, IEEE Computer Society, 848--853","author":"Jones Austin","year":"2014","unstructured":"Austin Jones , Zhaodan Kong , and Calin Belta . 2014 . Anomaly detection in cyber-physical systems: A formal methods approach Decision and Control (CDC) , 2014 IEEE 53rd Annual Conference on. IEEE, IEEE Computer Society, 848--853 . Austin Jones, Zhaodan Kong, and Calin Belta. 2014. Anomaly detection in cyber-physical systems: A formal methods approach Decision and Control (CDC), 2014 IEEE 53rd Annual Conference on. IEEE, IEEE Computer Society, 848--853."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899015.2899016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897035.2897041"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/645496.657889"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0034-6"},{"key":"e_1_3_2_1_23_1","volume-title":"Robert E Kooij, and Frances MT Brazier.","author":"Kocc Yakup","year":"2014","unstructured":"Yakup Kocc , Martijn Warnier , Piet Van Mieghem , Robert E Kooij, and Frances MT Brazier. 2014 . The impact of the topology on cascading failures in a power grid model. Physica A: Statistical Mechanics and its Applications Vol . 402 (2014), 169--179. Yakup Kocc, Martijn Warnier, Piet Van Mieghem, Robert E Kooij, and Frances MT Brazier. 2014. The impact of the topology on cascading failures in a power grid model. Physica A: Statistical Mechanics and its Applications Vol. 402 (2014), 169--179."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"e_1_3_2_1_25_1","unstructured":"Edward A. Lee. 2008. Cyber Physical Systems: Design Challenges http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008--8.html. Technical Report UCB\/EECS-2008--8. EECS Department University of California Berkeley. http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008-8.html  Edward A. Lee. 2008. Cyber Physical Systems: Design Challenges http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008--8.html. Technical Report UCB\/EECS-2008--8. EECS Department University of California Berkeley. http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2008\/EECS-2008-8.html"},{"key":"e_1_3_2_1_26_1","volume-title":"New wave of cyberattacks against Ukrainian power industry. (January","author":"Lipovsky Robert","year":"2016","unstructured":"Robert Lipovsky . 2016. New wave of cyberattacks against Ukrainian power industry. (January . 2016 ). http:\/\/www.welivesecurity.com\/2016\/01\/11 Robert Lipovsky. 2016. New wave of cyberattacks against Ukrainian power industry. (January. 2016). http:\/\/www.welivesecurity.com\/2016\/01\/11"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952982.1952995"},{"key":"e_1_3_2_1_29_1","volume-title":"Anomaly detection in production plants using timed automata 8th International Conference on Informatics in Control, Automation and Robotics (ICINCO). 363--369","author":"Maier Alexander","unstructured":"Alexander Maier , Asmir Vodencarevic , Oliver Niggemann , Roman Just , and Michael Jaeger . 2011. Anomaly detection in production plants using timed automata 8th International Conference on Informatics in Control, Automation and Robotics (ICINCO). 363--369 . Alexander Maier, Asmir Vodencarevic, Oliver Niggemann, Roman Just, and Michael Jaeger. 2011. Anomaly detection in production plants using timed automata 8th International Conference on Informatics in Control, Automation and Robotics (ICINCO). 363--369."},{"key":"e_1_3_2_1_30_1","volume-title":"Jorge Mario, Michael Aaron King Urrea, Abraham Anthony Clements, and Joshua Jacob.","author":"Mulder John","year":"2013","unstructured":"John Mulder , Moses Schwartz , Michael Berg , Jonathan Roger Van Houten , Jorge Mario, Michael Aaron King Urrea, Abraham Anthony Clements, and Joshua Jacob. 2013 . WeaselBoard: Zero- Day Exploit Detection for Programmable Logic Controllers. Technical Report. tech. report SAND2013--8274, Sandia National Laboratories . John Mulder, Moses Schwartz, Michael Berg, Jonathan Roger Van Houten, Jorge Mario, Michael Aaron King Urrea, Abraham Anthony Clements, and Joshua Jacob. 2013. WeaselBoard: Zero-Day Exploit Detection for Programmable Logic Controllers. Technical Report. tech. report SAND2013--8274, Sandia National Laboratories."},{"key":"e_1_3_2_1_31_1","volume-title":"AAAI","volume":"2","author":"Niggemann Oliver","year":"2012","unstructured":"Oliver Niggemann , Benno Stein , Asmir Vodencarevic , Alexander Maier , and Hans Kleine B\u00fcning . 2012 . Learning Behavior Models for Hybrid Timed Systems . AAAI , Vol. Vol. 2 . 1083--1090. Oliver Niggemann, Benno Stein, Asmir Vodencarevic, Alexander Maier, and Hans Kleine B\u00fcning. 2012. Learning Behavior Models for Hybrid Timed Systems. AAAI, Vol. Vol. 2. 1083--1090."},{"key":"e_1_3_2_1_32_1","volume-title":"Intrusion detection and event monitoring in SCADA networks. Critical Infrastructure Protection","author":"Oman Paul","year":"2007","unstructured":"Paul Oman and Matthew Phillips . 2007. Intrusion detection and event monitoring in SCADA networks. Critical Infrastructure Protection ( 2007 ), 161--173. Paul Oman and Matthew Phillips. 2007. Intrusion detection and event monitoring in SCADA networks. Critical Infrastructure Protection (2007), 161--173."},{"key":"e_1_3_2_1_33_1","volume-title":"Robust and accurate anomaly detection in ECG artifacts using time series motif discovery. Computational and mathematical methods in medicine","author":"Sivaraks Haemwaan","year":"2015","unstructured":"Haemwaan Sivaraks and Chotirat Ann Ratanamahatana . 2015. Robust and accurate anomaly detection in ECG artifacts using time series motif discovery. Computational and mathematical methods in medicine Vol. 2015 ( 2015 ). Haemwaan Sivaraks and Chotirat Ann Ratanamahatana. 2015. Robust and accurate anomaly detection in ECG artifacts using time series motif discovery. Computational and mathematical methods in medicine Vol. 2015 (2015)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899006"},{"key":"e_1_3_2_1_36_1","volume-title":"FTRTFT","author":"Stavros Tripakis","unstructured":"Stavros Tripakis . 2002. Fault diagnosis for timed automata . In FTRTFT , Vol. Vol. 2469 . Springer , 205--224. Stavros Tripakis . 2002. Fault diagnosis for timed automata. In FTRTFT, Vol. Vol. 2469. Springer, 205--224."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_38_1","volume-title":"International Colloquium on Grammatical Inference","author":"Verwer Sicco","unstructured":"Sicco Verwer , Mathijs de Weerdt , and Cees Witteveen . 2010. A likelihood-ratio test for identifying probabilistic deterministic real-time automata from positive data . In International Colloquium on Grammatical Inference . Springer Berlin Heidelberg , 203--216. Sicco Verwer, Mathijs de Weerdt, and Cees Witteveen. 2010. A likelihood-ratio test for identifying probabilistic deterministic real-time automata from positive data. In International Colloquium on Grammatical Inference. Springer Berlin Heidelberg, 203--216."},{"key":"e_1_3_2_1_40_1","volume-title":"Mathijs M De Weerdt, and Cees Witteveen","author":"Verwer Sicco E","year":"2006","unstructured":"Sicco E Verwer , Mathijs M De Weerdt, and Cees Witteveen . 2006 . Identifying an automaton model for timed data. In Benelearn 2006: Proceedings of the 15th Annual Machine Learning Conference of Belgium and the Netherlands, Ghent, Belgium , 11--12 May 2006. Sicco E Verwer, Mathijs M De Weerdt, and Cees Witteveen. 2006. Identifying an automaton model for timed data. In Benelearn 2006: Proceedings of the 15th Annual Machine Learning Conference of Belgium and the Netherlands, Ghent, Belgium, 11--12 May 2006."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAT.2011.6102093"},{"key":"e_1_3_2_1_42_1","volume-title":"Computer security: Is this the start of cyberwarfare? Nature","author":"Weinberger Sharon","year":"2011","unstructured":"Sharon Weinberger . 2011. Computer security: Is this the start of cyberwarfare? Nature Vol. 174 ( June . 2011 ). Sharon Weinberger. 2011. Computer security: Is this the start of cyberwarfare? Nature Vol. 174 (June. 2011)."},{"key":"e_1_3_2_1_43_1","volume-title":"2015 54th Annual Conference of the. 977--979","author":"Wilhoit K.","unstructured":"K. Wilhoit and S. Hara . 2015. The real world evaluation of cyber-attacks against ICS system Society of Instrument and Control Engineers of Japan (SICE) , 2015 54th Annual Conference of the. 977--979 . K. Wilhoit and S. Hara. 2015. The real world evaluation of cyber-attacks against ICS system Society of Instrument and Control Engineers of Japan (SICE), 2015 54th Annual Conference of the. 977--979."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177732360"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.423"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821404.2821410"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196546"}},"subtitle":["A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":44,"alternative-id":["10.1145\/3196494.3196546","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196546","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}