{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:41:39Z","timestamp":1762659699666,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3201587","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"821-823","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Anand","family":"Agrawal","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]},{"given":"Chuadhry Mujeeb","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. http:\/\/news.oreilly.com\/2008\/07\/coverage-of-terry-childs.html. (2010).  2010. http:\/\/news.oreilly.com\/2008\/07\/coverage-of-terry-childs.html. (2010)."},{"key":"e_1_3_2_1_2_1","unstructured":"2012. http:\/\/www.computerworld.com\/article\/2489761\/technology-lawregulation\/it-pro-gets-4-years-in-prison-for-sabotaging-ex-employer-ssystem.html. (2012).  2012. http:\/\/www.computerworld.com\/article\/2489761\/technology-lawregulation\/it-pro-gets-4-years-in-prison-for-sabotaging-ex-employer-ssystem.html. (2012)."},{"key":"e_1_3_2_1_3_1","unstructured":"2013. https:\/\/www.theguardian.com\/world\/2013\/aug\/21\/bradley-manning-35- years-prison-wikileaks-sentence. (2013).  2013. https:\/\/www.theguardian.com\/world\/2013\/aug\/21\/bradley-manning-35- years-prison-wikileaks-sentence. (2013)."},{"key":"e_1_3_2_1_4_1","unstructured":"2013. https:\/\/www.theguardian.com\/world\/2013\/jun\/09\/edward-snowden-nsawhistleblower-surveillance. (2013).  2013. https:\/\/www.theguardian.com\/world\/2013\/jun\/09\/edward-snowden-nsawhistleblower-surveillance. (2013)."},{"key":"e_1_3_2_1_5_1","unstructured":"Marshall Abrams. 2008. Malicious control system cyber security attack case study--Maroochy Water Services Australia. (2008).  Marshall Abrams. 2008. Malicious control system cyber security attack case study--Maroochy Water Services Australia. (2008)."},{"volume-title":"2016 Smart City Security and Privacy Workshop (SCSP-W). 1--5.","author":"Ahmed C. M.","key":"e_1_3_2_1_6_1"},{"volume-title":"2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). 517--524","author":"Ahmed C. M.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053011"},{"key":"e_1_3_2_1_9_1","unstructured":"Sharon Gaudin. 2000. Case study of insider sabotage: the Tim Lloyd\/Omega case. (2000).  Sharon Gaudin. 2000. Case study of insider sabotage: the Tim Lloyd\/Omega case. (2000)."},{"key":"e_1_3_2_1_10_1","unstructured":"Naman Govil Anand Agrawal and Nils Ole Tippenhauer. 2018. On Ladder Logic Bombs in Industrial Control Systems. In Computer Security Sokratis K. Katsikas Fr\u00e9d\u00e9ric Cuppens Nora Cuppens Costas Lambrinoudakis Christos Kalloniatis John Mylopoulos Annie Ant\u00f3n and Stefanos Gritzalis (Eds.). Springer International Publishing Cham 110--126.  Naman Govil Anand Agrawal and Nils Ole Tippenhauer. 2018. On Ladder Logic Bombs in Industrial Control Systems. In Computer Security Sokratis K. Katsikas Fr\u00e9d\u00e9ric Cuppens Nora Cuppens Costas Lambrinoudakis Christos Kalloniatis John Mylopoulos Annie Ant\u00f3n and Stefanos Gritzalis (Eds.). Springer International Publishing Cham 110--126."},{"volume-title":"2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater). 31--36","author":"Mathur A. P.","key":"e_1_3_2_1_11_1"},{"volume":"201","journal-title":"Ruths J.","author":"Qadeer","key":"e_1_3_2_1_12_1"},{"volume-title":"CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. ArXiv e-prints","year":"2016","author":"Rocchetto M.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185505.2185515"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3201587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3201587"}},"subtitle":["Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":15,"alternative-id":["10.1145\/3196494.3201587","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3201587","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}